• Online, Self-Paced
Course Description

Discover tools and techniques to crack password hashes and use those hashes to gain unauthorized access to systems.

Learning Objectives

CEHv10: Password Attacks Part 2

  • use popular password cracking tools like John the Ripper and Hashcat to crack passwords
  • use GUI based password cracking tools like Ophcrack and gather password hashes for later cracking
  • use man-in-the-middle attacks and pass-the-hash to gain access without cracking the password hash

 

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operations
  • Cybersecurity Management
  • Exploitation Analysis
  • Vulnerability Assessment and Management

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.