After reading this chapter and completing the exercises, you will be able to do the following:
Understand the basics of cryptography
Understand how cryptography affects your penetration testing
Use standard methods to attempt to circumvent cryptography
You may be asking yourself, why a chapter on cryptography in a book about penetration testing? Cryptography is used to secure data, to store password hashes, ...