Summary
In this chapter, we discussed using OSINT to potentially identify passwords from previous breaches, to save us the time of identifying and cracking an available password again. However, this approach is not always fruitful, so we discussed obtaining password candidates from other sources as well. Using this information before leveraging cracking can significantly reduce the time and effort required.
Now, after setting up a cracking environment, we need to create appropriate wordlists and rules to use in our various cracking initiatives throughout Part 2. This will be covered in more detail in Chapters 3 and 4 as we discuss the installation of John and hashcat and their associated rules and usage.