Skip main navigation

New offer! Get 30% off one whole year of Unlimited learning. Subscribe for just £249.99 £174.99. T&Cs apply

Brute Forcing your First Real Password

This video demonstrates how to crack a real password using John the Ripper and a custom brute force mode. Passwords are typically randomly generated with a password generator or a …

Cracking Weak Passwords

This video will look at why weak passwords are best cracked by brute force attacks. How to break a weak password with a custom configuration will be demonstrated. Why start …

Setting Up the Environment

This step will describe the prerequisites and steps to set up an environment for security testing. Prerequisites include: CPU with 6-8 Cores, 6-8 GB of RAM, and 100-250 GB of …

Bypassing your First Password

This step will explain how to use the open-source password cracking tool, John the Ripper, to crack a password. We’ll be using John the Ripper for various reasons. For one, …

Basics of Hashing and Cryptography

This step will explain the basics of hashing and cryptography, and how these concepts relate to passwords security. Passwords are never encrypted, they are hashed. That means that fixed bits …

Basics of Entropy for Password Security

This video will explain entropy, and how this concept relates to password security. As we will see, entropy is a measure of information, which is measured in bit. The higher …

Password Managers, The All-In-One Solution?

This video explains what a password manager is and the differences between online and offline password managers are discussed. A password manager is an application that manages your passwords and …

Other Considerations

In this video, you will learn about password security best practices. The following four rules are crucial for keeping your password safe. Don’t store your password in plaintext Don’t store …

Case Studies Part 2

This video covers more real-life examples of password attacks. Attacks on the following accounts are discussed: LinkedIn 8fit Adobe This highlights that everyone can be a target including big companies, …

Case Studies Part 1

This video describes real-life examples of password attacks. Ways in which an attack could have been prevented are discussed, as well as the consequences of the attack. Attacks on the …

Legal Considerations

Before we get started, it is necessary to understand that your online exploits are subject to legal ramifications. We will cover legal considerations to clarify what passwords you can use …

Welcome to Week 2

In Week 2, we will cover the downsides of passwords and miscellaneous vulnerabilities of passwords and their misuse. We will also take a brief look at alternatives to passwords. We …