{"id":2177,"date":"2026-03-19T12:06:00","date_gmt":"2026-03-19T12:06:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/locky\/?p=2177"},"modified":"2026-03-18T14:14:39","modified_gmt":"2026-03-18T14:14:39","slug":"password-cracking-system-users","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/locky\/2026\/03\/19\/password-cracking-system-users\/","title":{"rendered":"Password Cracking (System Users)"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Assignment-5-Password-Cracking-System-Users-fd_2.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">Assignment-5-Password-Cracking-System-Users-fd_2<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-1 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Assignment-5-Password-Cracking-System-Users-fd_2.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>This lab explores password cracking techniques across Linux and Windows systems. Using tools like John the Ripper and Cain &amp; Abel, the assignment demonstrates dictionary and brute-force attacks on user password hashes. It highlights how weak passwords can be compromised and emphasizes the importance of strong authentication practices, secure password policies, and system hardening to defend against credential-based attacks.<\/p>\n","protected":false},"author":30379,"featured_media":2180,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"image","meta":{"advanced_seo_description":"This lab explores password cracking techniques across Linux and Windows systems. Using tools like John the Ripper and Cain & Abel, the assignment demonstrates dictionary and brute-force attacks on user password hashes. It highlights how weak passwords can be compromised and emphasizes the importance of strong authentication practices, secure password policies, and system hardening to defend against credential-based attacks.","jetpack_seo_html_title":"Password Cracking Lab: Linux & Windows System Users","jetpack_seo_noindex":false,"footnotes":"","wds_primary_category":172,"jetpack_publicize_message":"Used John the Ripper & Cain and Abel to perform dictionary and brute-force attacks on Linux & Windows user hashes\u2014highlighting how weak credentials expose systems.\n#Cybersecurity #PasswordSecurity #EthicalHacking","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[242,172,214,241,240,40],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/PasswordCracking_SystemUsers.jpg?fit=1360%2C768&ssl=1","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts\/2177"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/users\/30379"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/comments?post=2177"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts\/2177\/revisions"}],"predecessor-version":[{"id":2181,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts\/2177\/revisions\/2181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media\/2180"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media?parent=2177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/categories?post=2177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/tags?post=2177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}