Skip to main content

6 docs tagged with "forensics"

View all tags

Hashcat — Usage & Practical Guide

Hands-on guide to Hashcat — GPU-accelerated password recovery tool. Covers installation, attack modes (dictionary, mask, combinator), rule usage, tuning, hash formats, performance tips, and safe lab exercises.

John the Ripper (Password Cracking)

Practical guide to John the Ripper — installation, workflows (identification → wordlist → rules → incremental), common commands, hash formats, and safe hands-on labs.

Network Sniffing Lab

Hands-on lab for learning packet capture and analysis with Wireshark, tcpdump, tshark, and supporting tools. Covers capture setup, filters, extracting artifacts, detecting suspicious traffic, and safe lab exercises.

Password Cracking Lab

Hands-on lab to practice password auditing using John the Ripper, Hashcat, and Hydra — safe setup, datasets, attack strategies, GPU tuning, and reporting guidance.

Tools List

Curated list of essential cybersecurity tools organized by category: reconnaissance, exploitation, scanning, monitoring, forensics, password cracking, cloud security, and developer/CI tooling. Includes quick install tips, example commands, and best-practice notes.