00 — Overview

Password Attacks

Break login systems, crack hashes, and exploit weak credentials. Hydra for online attacks, Hashcat for offline cracking, and the wordlists that make it all work.

Intermediate·45 min·5 tasks
// By the end of this module
Brute force SSH, FTP, and HTTP login forms with Hydra
Crack MD5, SHA-256, bcrypt, and Linux shadow hashes with Hashcat
Build effective wordlists and apply mutation rules
Understand the difference between online and offline attacks
// Prerequisites
Complete these before starting this module for the best experience.