Understanding Linux system security for Users Guide for beginners

Understanding Linux system security

Know about Linux system security One of the most important Linux system security feature are passwords today. Most of server administrator and users use password to secure their system to get access by others. In Linux (RHEL/DEBIAN) these passwords are saved in passwd and shadow files in /etc directory. In deep description about passwd and … Read more

Brute Force Attack for Cracking Passwords using Cain and Abel

Brute Force Attack for Cracking Passwords using Cain and Abel

Hello friends, Welcome again! We are discussing about Penetration Testing Tutorial and this article under section cracking passwords and hashes cracking. Brute force attack with cain and abel In my previous post Cain and Abel software for cracking hashes tutorial you have learnt about basic features or cain and abel. In the last of post I … Read more

Rainbow Tables Attack (Cryptanalysis attack) and winrtgen Complete Guide

Rainbow Tables Attack (Cryptanalysis attack) and winrtgen

The Rainbow tables attack is one of the most favorite attacks for hackers to crack password easily. But getting a rainbow table on the internet as per your requirements is no easy task. In this article, one more interesting topic will cover (how to use winrtgen to generate a rainbow table) You have read two … Read more

Cain and Abel software for cracking hashes Guide for Beginners

Description of Cain and Abel Software According to the official website http://www.oxid.it/cain.html , Cain and Abel software is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kinds of passwords by sniffing the network, cracking hashes passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, … Read more

How to Unshadow the file and dump Linux password Easy Guide

Unshadow the file and dump Linux password

Hello friends, welcome again! In the last post I told about Understanding Linux system security for Users After reading this post you have knowledge about Linux file system, and where username and password are stored in Linux? where you can dump this password? when you dump password, it will be in plain text or encrypted format? … Read more

Generate Rainbow Tables and Crack Hashes in Kali Linux Complete Guide

Generate Rainbow Tables and Crack Hashes in Kali Linux

Generate Rainbow Tables and Crack Hashes with rcracki_mt Rcracki_mt is a tool used to crack hashes and found in kali linux by default.  It is used rainbow tables to crack the password. Some other tools generate rainbow tables. You can download Rainbow table https://www.freerainbowtables.com/tables2/ if you don’t want to download rainbow table you can create you own … Read more

How to use thc-hydra for Dictionary attack beginner’s guide

thc-hydra A very fast network logon cracker with a dictionary attack tool which support many different services. You can use thc-hydra tool for cracking the password. Many hackers love this tool due to its GUI and Cmdline interface. If you are new in ethical hacking and don’t know how to use thc-hydra, still you can use … Read more

Hashcat Tutorial on Brute force & Mask Attack step by step guide

hashcat tutorial for Password Cracking

Hashcat Tutorial for beginner Password cracking is a very interesting topic and loved by every hacker. There are multiple password cracking software exist in the market for cracking the password. but hashcat is unique.  Hashcat is working well with GPU, or we can say it is only designed for using GPU. GPU has amazing calculation … Read more

Dictionary attack For Cracking passwords by Cain and Abel ultimate guide

Cracking passwords by Dictionary attack using Cain and Abel

Dictionary attack From Wikipedia: “A dictionary attack uses a targeted technique of successively trying all the words in an exhaustive list called a dictionary (from a pre-arranged list of values). In contrast with a brute force attack, where a large proportion key space is searched systematically, a dictionary attack tries only those possibilities which are … Read more

Find Window password hashes from SAM database Complete Guide for beginners

Administrator password hashes from SAM database

What is Password Hashes and SAM Database? SAM is stand for Security Account Manager. SAM database is a part of  windows Operating system consist user name and password in encrypted format called password hashes. SAM file is exist under C:/Windows/System32/config in Window 7/8/8.1/10. If User want to logon on the machine, user name and password … Read more