00:00 – 1. Cryptography – Hashing and MD5
04:39 – 2. Password Cracking – Cracking MD5 Hashes Using John
07:33 – 3. Password Cracking – John Rules
18:17 – 4. Writing a John Rule Generation Utility – Character Substitution
28:46 – 6. Cracking Encrypted ZIPs with John the Ripper