Password Cracking 101+1: Part 6 - Hybrid Attacks

Поделиться
HTML-код
  • Опубликовано: 7 сен 2024
  • In this session we learn about hybrid attacks, which combine either a dictionary + mask, or mask + dictionary.
    A Kali Linux OVA virtual machine can be download from our site so you can follow along with the challenges in.security/te...
    #passwordcracking #hashcat

Комментарии • 5

  • @TheRidDlerX44
    @TheRidDlerX44 2 года назад

    Love this video series. Its completely taken the mystery out of hashes and dealing with them. A solid foundation to something in my skillset. Thank you

  • @kashmirifunnyvideo123
    @kashmirifunnyvideo123 Месяц назад

    Love u

  • @ausglobeman
    @ausglobeman Месяц назад

    When it comes to the type of person that would be attacked, i.e. someone unknowing - they are usually gonna keep the default password provided by their ISP (12+ random alphanumeric lc/uc characters). Making wordlists completely pointless. I think when it comes to the average home wifi, hashcat is not able to do anything special.

  • @AlexJust67
    @AlexJust67 2 года назад +1

    How would you have the users password hash in the case of a man-in-the-middle attack being the file server? If I understood correctly the only information that the file server would receive/have is: the plaintext username, the challenge and the challenge encrypted with the hash of the password.

    • @in.security8450
      @in.security8450  2 года назад +1

      This type of authentication/scenario can be used in a network poisoning attack where the attacker can impersonate the file server and illicits NTLMv1/2 hashes from the victim. Common tools that can be used to achieve this are responder and Inveigh and there are plenty of writeups online about it.