Summary
Review of Unix password security, differences in hashing algorithms, reasons for conducting a password audit, extensive coverage of John the Ripper software, and an overview of rainbow tables.
4:26 - Compiling John the Ripper
12:15 - Running John the Ripper
12:55 - John the Ripper in single mode
15:20 - John the Ripper in dictionary mode
19:03 - Ophcrack overview
19:57 - Cain overview
22:48 - Example of John the Ripper in incremental (brute force) mode
Reference Materials
http://www.openwall.com/john - John the Ripper Homepage (Download Location)
http://www.openwall.com/john/doc - John the Ripper Documentation
http://ophcrack.sourceforge.net/ - Ophcrack Homepage
http://www.oxid.it/cain.html - Cain & Abel Homepage
0 Comments