00 — Overview
Password Attacks
Break login systems, crack hashes, and exploit weak credentials. Hydra for online attacks, Hashcat for offline cracking, and the wordlists that make it all work.
Intermediate·45 min·5 tasks
// By the end of this module
→Brute force SSH, FTP, and HTTP login forms with Hydra
→Crack MD5, SHA-256, bcrypt, and Linux shadow hashes with Hashcat
→Build effective wordlists and apply mutation rules
→Understand the difference between online and offline attacks
// Prerequisites
Complete these before starting this module for the best experience.