Credential Access with Hashcat

Hashcat is the number one offline password cracker used by red team members and penetration testers. If you want to learn how to use Hashcat to crack passwords with different password cracking techniques, then this course is for you.
Course info
Level
Intermediate
Updated
May 4, 2020
Duration
28m
Table of contents
Description
Course info
Level
Intermediate
Updated
May 4, 2020
Duration
28m
Description

Red team members and penetration testers need to know how to crack passwords with different password cracking techniques. In this course, Credential Access with Hashcat, you will learn about Hashcat, the number one offline password cracker. First, you will see how to launch a dictionary attack using Hashcat. Next, you will discover how you can crack more passwords when you launch a dictionary attack with a rule. Then, you will learn how to launch a dictionary attack with a mask, also known as a hybrid attack). Finally, you will explore how to use Hashcat to crack password-protected PDF and DOCX files. By the end of this course, you will know how to use Hashcat to crack passwords with different password cracking techniques.

About the author
About the author

Dawid Czagan is listed among the Top 10 Hackers by HackerOne. He has found security vulnerabilities in Google, Yahoo, Mozilla, Microsoft, Twitter, and other companies. Due to the severity of these bugs, he has received numerous awards for his findings.

More from the author
More courses by Dawid Czagan
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Welcome to Pluralsight and the Cybersecurity Tools. Course featuring Hash Cat, the open source tool developed and maintained by Jens Stoiber. Hash Scott is the number one offline password _______ used by red team members and ___________ testers. If you want to learn how to use hash cat to crack passwords with different password cracking techniques, then this course is for you. First, I will show you how to launch a dictionary attack using cash cat. Next, I will demonstrate how you can crack mawr passwords when you launch a dictionary attack we for rule after death, I will demonstrate a dictionary attack with unmasked, also known as a hybrid attack. And this attack will help you crack even more passwords. What's more, I will show you how you can use Hash cat to crack password protected PdF and Doc X files. Well, you will see primarily in the scores are demos and step by step instructions. Because this course is apart off the red team tools path. I hope you'll join me on this journey to learn about Hash Scout and password cracking with the credential access. We've hash got course at Pluralsight.