This lab explores password cracking techniques across Linux and Windows systems. Using tools like John the Ripper and Cain & Abel, the assignment demonstrates dictionary and brute-force attacks on user password hashes. It highlights how weak passwords can be compromised and emphasizes the importance of strong authentication practices, secure password policies, and system hardening to defend against credential-based attacks.
Category: Pen Testing
Linux: Cracking Passwords
Explores Linux password cracking concepts, including hashing, shadow files, attack methods, and how ethical testing improves authentication security.
Determinism within Cybersecurity & Computer Hacking
An exploration of determinism in cybersecurity, examining how predictable system behavior influences hacking methods, defensive strategies, automation, and ethical considerations.
Ransomware Mitigation Strategies for Windows Systems: Securing Servers and Endpoints
Explores ransomware mitigation strategies for Windows systems, including backups, hardening, access controls, monitoring, and endpoint protection for servers and endpoints.
The NotPetya Cybersecurity Attack & Breach
Explains the NotPetya cybersecurity attack, how it spread, why it caused widespread damage, and the key lessons learned about resilience, segmentation, and global cyber risk.
Cyber Threats vs. Cyber Attacks
Explains the difference between cyber threats and cyber attacks, how each affects risk, defense strategies, and organizational security planning.