Credential Access

In this chapter, you will learn how to

•  Execute various types of password attacks

•  Define Windows and Linux password hash types

•  Investigate password cracking tools, techniques, and methodologies

•  Describe methods for harvesting hashes and credentials from target systems



Over the past few decades, computer systems have relied on usernames and passwords for authentication. The username provides the identity for the account and the password helps verify the identity of the user because it is a secret that only the account user should know. Passwords are not meant to be easily guessable, but to this day users are prone to using weak or known passwords that are susceptible to compromise, which is a sure ...

Get GPEN GIAC Certified Penetration Tester All-in-One Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.