From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Discovering password tools
From the course: Ethical Hacking: System Hacking
Discovering password tools
- [Instructor] Cracking a password is more of an art than a science, and it all boils down to having the right tool. In this segment, we'll review some of the tools and techniques used to obtain a password. Malicious actors often use methods to obtain or crack passwords because it will grant them unauthorized access to a system, networks or sensitive data. On most systems, passwords are stored as a hash value and protected to ensure system security. On a Linux system, passwords are typically stored in the etc shadow file, which is accessible only by the root user and contains encrypted password hashes, along with other user account information. On a Windows system, passwords are stored in the security account manager or SAM database. Access to this file is restricted to system processes and administrators to maintain security. To obtain a password, a malicious actor can use password recovery tools, which are applications designed to obtain a password in a variety of ways. Tools…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.