Setting Up Your Password Cracking Environment
It is possible that after your work in the previous chapters, you have been able to obtain the credentials you need to recover. However, this is not always the case and we need to turn to more overt methods for recovering the credentials we need. You may have also built a supplemental wordlist for use in these processes, which will help us as we move on.
In this book, we will focus on two primary pieces of software for password cracking specifically. It is important to note that we will use other software packages in later chapters to assist with the recovery of certain credential types. In some cases, these will be supplemental programs or scripts to assist in converting hashes to formats recognized by our password-cracking programs. In other cases, we will install software to help us capture the hashes for cracking. We will cover those tools when necessary.
An important thing to note is that all links and URLs are correct at the...