From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 24,200 courses taught by industry experts.

Discovering password tools

Discovering password tools

- [Instructor] Cracking a password is more of an art than a science, and it all boils down to having the right tool. In this segment, we'll review some of the tools and techniques used to obtain a password. Malicious actors often use methods to obtain or crack passwords because it will grant them unauthorized access to a system, networks or sensitive data. On most systems, passwords are stored as a hash value and protected to ensure system security. On a Linux system, passwords are typically stored in the etc shadow file, which is accessible only by the root user and contains encrypted password hashes, along with other user account information. On a Windows system, passwords are stored in the security account manager or SAM database. Access to this file is restricted to system processes and administrators to maintain security. To obtain a password, a malicious actor can use password recovery tools, which are applications designed to obtain a password in a variety of ways. Tools…

Contents