O'Reilly logo

BackTrack 5 Cookbook by David De Smet, Willie Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Password Cracking

In this chapter, we will cover:

  • Online password attacks
  • Cracking HTTP passwords
  • Gaining router access
  • Password profiling
  • Cracking a Windows password using John the Ripper
  • Using dictionary attacks
  • Using rainbow tables
  • Using NVIDIA Compute Unified Device Architecture (CUDA)
  • Using ATI Stream
  • Physical access attacks

Introduction

In this chapter, we will explore various ways to crack passwords to gain access to user accounts. Cracking passwords is a task that is used by all penetration testers. Inherently, the most insecure part of any system are the passwords submitted by users. No matter the password policy, humans inevitably hate entering strong passwords or resetting them as often as they should. This makes them an easy target ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required