What we will Cover in our Journey
In the first chapter, we will cover a basic introduction to the Windows foundational security authentication protocols Kerberos and NTLM. Both of these protocols create encrypted passkeys - tickets for Kerberos, and hashes for NTLM. For simplicity’s sake, I will call both of these “password hashes” throughout the book. We will then cover some of the popular tools and techniques used to obtain these hashes.
We then take an extensive look at wordlists. Wordlists are the foundation to password cracking. Using a good wordlist will greatly increase your chances and speed of password cracking. We will cover how ...