Now that we have reached the end of Day 6, let's recap what we talked about. This chapter was all about password- based attacks. I started the chapter off by talking about rainbow tables and wordlists. I discussed some of the utilities that I used in the lab, such as RainbowCrack and Crunch, to generate my own wordlist and rainbow tables. I also discussed some other ways to get these resources online as well. After getting those lists created, I discussed a couple of cracking utilities that I use in my tests. These utilities included John the Ripper, THC-Hydra, Medusa, and finally Ncrack-all great utilities that make password cracking easy.
Finally, I finished off the chapter by talking about social engineering experiments that are probably the easiest way to crack a password, that is, letting the user give it to you themselves.
In the next chapter, I will talk about...