This tutorial covers the process of password cracking in a real-world scenario. The main reasons you might need to crack a password is to get credentials during a penetration test or when evaluating intelligence. Both scenarios will happen and having the ability to crack the hash with the tools you have access to is imperative.
Building a Virtual Cyber Security Lab Part 3 – The Security Onion
In this part of the video series we will continue creating our virtualized lab training environment by installing the Security Onion network security monitoring VM. Securtiy Onion will provide the ability to monitor the lab for security threats and attacks; i.e. the “Detect” aspect. The detect function is critical for an analyst to know, and serves as the foundation to build upon.
Building a Virtual Cyber Security Lab Part 2 – Kali Linux
In the last post we setup the SAN’s SIFT forensics workstation in VMWare Player, now we will setup Kali Linux. Kali is used for penetration testing, i.e. offensive operations, and it will help us learn how to detect malicious traffic in the virtualized test environment we are setting up.