
www.itdojo.com
757-216-3656
info@itdojo.com
Advanced Password Analysis & Recovery
Advanced Password Analysis & Recovery
Course Duration
5 Days
Audience
Employees of federal, state and local governments; and businesses working with the government.
Prerequisites
No prerequisites required.
Course Description
This course equips students with the knowledge and skills needed to perform password auditing using tools like Hashcat and John the Ripper. Students gain a thorough understanding of password cracking techniques, methodologies for different hash types, and hardware optimization for password recovery. Special focus is placed on the application of advanced attack modes using Hashcat and John the Ripper, ensuring students can audit standard and complex password scenarios in real-world environments.
Learning Objectives
- Understand password storage mechanisms, hash types, and common weaknesses in password-based authentication
- Configure and operate Hashcat and John the Ripper for a variety of password auditing scenarios
- Apply wordlist, brute-force, mask, rule-based, and combination attack modes effectively
- Optimize hardware configurations (CPU and GPU) for high-performance password recovery
- Analyze and crack password hashes from common operating systems and applications
- Conduct sanctioned password audits in compliance with applicable policies and legal requirements
Course Outline
Introduction to Password Security
- Password storage and hashing fundamentals
- Common hash types (MD5, SHA, NTLM, bcrypt, etc.)
- Why passwords fail and how auditors find weaknesses
Hashcat Fundamentals
- Installation, configuration, and hardware optimization
- Attack modes: straight, combination, brute-force, mask, hybrid
- Rule-based attacks and custom rule creation
- Wordlists and candidate generation strategies
John the Ripper Fundamentals
- Installation and configuration
- Format detection and hash extraction
- Incremental, wordlist, and rules-based cracking
Advanced Attack Techniques
- Markov chains and PRINCE attacks
- Cracking complex and enterprise password policies
- Distributed cracking and cluster setup
Real-World Scenarios and Lab Exercises
- Extracting and cracking hashes from Windows, Linux, and applications
- Auditing Active Directory password hashes
- Reporting and remediation recommendations