CEH v11: Passwords Attacks, Extraction & Cracking

Ethical Hacker v11    |    Intermediate
  • 3 videos | 58m 58s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Passwords are a part of many of today's authentication systems and are therefore prone to attack. In this course, you'll investigate common attack methods and tools used to defeat passwords. You'll examine how hackers are able to obtain and decrypt a user's password, including tools and techniques used to procure encrypted passwords and cracking tools used to uncover the original password data. Finally, you'll learn about common password cracking enhancement techniques aimed to decrease the amount of time and increase the success rate when attempting to crack passwords. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize the difference between non-technical and technical password attacks
    identify tools used to perform an online passive password attack
    recognize the tools used to perform an offline password attack
    Identify a tool you can use to capture the windows password hashes
    identify tools used to crack password hashes
  • recognize techniques to capture the password hashes in linux
    recognize how to capture password hashes from live traffic
    Identify the password attack enhancement that allows you to combine multiple dictionary files together
    recognize enhanced password attack features that combine entries together
    identify how to create rules in john the ripper to enhance password cracking capabilities

IN THIS COURSE

  • Locked
    1.  Password Attack Basics
    15m 20s
    Upon completion of this video, you will be able to recognize the difference between non-technical and technical password attacks. FREE ACCESS
  • Locked
    2.  Password Extraction and Cracking
    25m 48s
    Find out how to identify tools used to crack passwords. FREE ACCESS
  • Locked
    3.  Password Cracking Enhancement Techniques
    17m 50s
    In this video, you will learn how to create rules in John the Ripper to enhance password cracking capabilities. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.7 of 23 users Rating 4.7 of 23 users (23)
Rating 4.8 of 20 users Rating 4.8 of 20 users (20)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 165 users Rating 4.6 of 165 users (165)
Rating 4.7 of 20 users Rating 4.7 of 20 users (20)
Rating 4.7 of 23 users Rating 4.7 of 23 users (23)