Summary
In this chapter, we installed John and hashcat. While these are not the only software components we will use over the course of this book, these are the foundation for the rest of our success, and we will deal with other installations as needed in other chapters.
In the next chapter, we will review rule construction to increase the probability of successful password cracking.
In Part 2, we will start addressing the cracking of common hash types, chapter by chapter, so feel free to jump around to the chapters that are directly relevant to your current cracking work to find out more.