Part 2: Collection and Cracking
In this part, we will dive into specific hash types and how to collect them, how to format them, and how to crack them. While this will not be an exhaustive treatment of hash types, we will cover some of the most prominent ones you may need to interact with, and the steps can be substituted for other hash types with some modifications.
This part has the following chapters:
- Chapter 5, Windows and macOS Password Cracking
- Chapter 6, Linux Password Cracking
- Chapter 7, WPA/WPA2 Wireless Password Cracking
- Chapter 8, WordPress, Drupal, and Webmin Password Cracking
- Chapter 9, Password Vault Cracking
- Chapter 10, Cryptocurrency Wallet Passphrase Cracking