Ethical Hacking: Crypto 101

abdulrhmansayed


What
You’ll Learn
  • How to Crack all Windows Passwords
  • Create Hashes
  • How to Crack all Linux Passwords
  • Verify Data integrity
  • Use basic Crypto

Requirements

  • Kali Linux live usb or installed

Description

In this course you will learn about basic crypto for ethical hackers. You will learn about hashing, how to crack windows password hashes, how to crack linux hashes and about cryptography. Hashing is a process of converting a given input into a fixed-size alphanumeric string. The output of a hash function is often referred to as a message digest or simply, a hash. A good hash function satisfies the following properties: it is easy to compute the hash value for any given message, it is infeasible to generate two different messages that result in the same hash value, it is infeasible to modify a message without changing its hash value, and it is infeasible to determine the original message from its hash value.

When used properly, hashing can be an effective way to store sensitive data such as passwords while keeping them safe from prying eyes. This is because even if someone were to obtain the hash value of a password, they would still need to brute force guess the actual password which would be incredibly time consuming (if not impossible) with today’s computing power.

After completing this course, you will be able to crack the passwords hashes from a Windows and Linux computer and find all users passwords using hash cracking tools. You will also be able to verify data integrity and understand basic crypto.

Who this course is for:

  • Beginner Ethical Hackers

Get on Udemy

Share This Article
Leave a comment