Udemy – The Complete Hands-On Cybersecurity Analyst Course

    00:00 – 1. Cryptography – Hashing and MD5

    04:39 – 2. Password Cracking – Cracking MD5 Hashes Using John

    07:33 – 3. Password Cracking – John Rules

    18:17 – 4. Writing a John Rule Generation Utility – Character Substitution

    28:46 – 6. Cracking Encrypted ZIPs with John the Ripper

    0% Complete