Summary

In this chapter, you got to use three new tools for password cracking, and also learned how to add a new item to the main menu. Johnny, and his progenitor, John the Ripper, are the most popular tools you can find on Kali for cracking hashes on the local machine, so you will probably choose one of these two tools when you are testing your users' password decisions.

Hydra has many more options than basic John-based tools, but with the improved power comes increased complexity. Hydra is designed to attack specific devices over the wire, but as you discovered, the attack surface is very small and the tool is very noisy.

The final bonus was more customizing help. Now you know how to add items to the main menu to make Kali Linux your own.

In the next chapter, we will show you how to achieve and maintain elevated privilege in Windows devices. This is by far the most common approach to attacks by cyber-criminals. The average attacker gains access and maintains a presence in the target network for 90 days or more.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.58.5.57