Further reading
For more information regarding the topics that were covered in this chapter, take a look at the following resources:
- Masking syntax for John the Ripper:
https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/doc/MASK
- Rules syntax for John the Ripper:
http://www.openwall.com/john/doc/RULES.shtml
- Overview of the capture auxiliary modules in Metasploit:
https://www.offensive-security.com/metasploit-unleashed/server-capture-auxiliary-modules/