Before you start |
|
(W00) Course Instructions |
|
00:00:00 |
Module 1 |
|
(W58M09) Setup installation |
|
00:00:00 |
|
(W58M01) CPU vs GPU |
|
00:00:00 |
|
(W58M02) Online vs Offline |
|
00:00:00 |
|
(W58M03) Windows Passwords |
|
00:00:00 |
|
(W58M04) Linux Passwords |
|
00:00:00 |
|
(W58M05) Wireless Network Passwords |
|
00:00:00 |
|
(W58M06) Password hashes and salts |
|
00:00:00 |
|
(W58M07) Password lists in Kali Linux |
|
00:00:00 |
|
(W58M08) Profiling Passwords |
|
00:00:00 |
|
(W58A01) Module 1 Assignments |
UNLIMITED |
Module 2 |
|
(W58M10) Password guessing attacks |
|
00:00:00 |
|
(W58M12) Cracking the SAM file |
|
00:00:00 |
|
(W58M13) Linux password hash cracking |
|
00:00:00 |
|
(W58M14) WiFi cracking |
|
00:00:00 |
|
(W58M15) Hash cracking using Hashcat |
|
00:00:00 |
|
(W58M16) Patator |
|
00:00:00 |
|
(W58M17) PwndOrNot attack |
|
00:00:00 |
|
(W58M18) h8mail attack |
|
00:00:00 |
|
(W58M19) elspcrk attack |
|
00:00:00 |
|
(W58M20) Combinator attack |
|
00:00:00 |
|
(W58M11) Credential stuffing and shoulder surfing attacks |
|
00:00:00 |
|
(W58A02) Module 2 Assignments |
UNLIMITED |
Module 3 |
|
(W58M12) JTR - John The Ripper |
|
00:00:00 |
|
(W58M13) Hydra - GTK and CLI |
|
00:00:00 |
|
(W58M14) Network login auditing - Medusa |
|
00:00:00 |
|
(W58M15) Passing the hashes - Mimikatz |
|
00:00:00 |
|
(W58M16) Creating password lists for aircrack |
|
00:00:00 |
|
(W58M17) Real-life huge password lists |
|
00:00:00 |
|
(W58M18) Network auth cracking - Ncrack |
|
00:00:00 |
|
(W58M21) Cain & Abel and Brutus Ae2 |
|
00:00:00 |
|
(W58M22) Confirming attacks with Burp Suite |
|
00:00:00 |
|
(W58M23) Rainbow table attacks |
|
00:00:00 |
|
(W58A03) Module 3 Assignments |
UNLIMITED |
Module 4 |
|
(W58M54) Mask attack for time reduction |
|
00:00:00 |
|
(W58M55) ChromePass recovery |
|
00:00:00 |
|
(W58M56) Password spraying attacks |
|
00:00:00 |
|
(W58M57) Passwords patterns and comments |
|
00:00:00 |
|
(W58M58) Network analysing method to capture passwords |
|
00:00:00 |
|
(W58M59) Phishing attack to capture passwords |
|
00:00:00 |
|
(W58M60) Social engineering for password attacks |
|
00:00:00 |
|
(W58M61) Countermeasures for password cracking |
|
00:00:00 |
|
(W58M63) Hashcat and HashID |
|
00:00:00 |
|
(W58M64) Cracking tips and resources |
|
00:00:00 |
|
(W58A04) Module 4 Assignment |
UNLIMITED |
Final exam |
|
(W58Q01) Final Quiz |
|
00:20:00 |