Humans are terrible at creating passwords. We reuse them, make them predictable, and write them on sticky notes. This makes password attacks one of the most effective ways to gain access. From brute forcing to hash cracking, this lesson covers the techniques that exploit our password weaknesses.
The goal isn't just to break passwords - it's to do it efficiently. Trying every possible combination is technically possible but practically stupid. Smart attackers use wordlists, patterns, and password psychology.
Legal Warning
Types of Password Attacks
- Brute Force: Try every combination (slow, thorough)
- Dictionary Attack: Use wordlist of common passwords
- Hybrid Attack: Wordlist + rules (password → Password1!)
- Password Spraying: One password, many users
- Credential Stuffing: Use leaked credentials
- Hash Cracking: Crack captured password hashes
Online Password Attacks
Online attacks hit live services. They're slower because you're waiting for network responses, but they work when you don't have hashes.
Hydra
The Swiss Army knife of network brute forcing.
CrackMapExec (CME)
Perfect for Windows/SMB environments. Can spray across entire subnets.
Account Lockout
Password Spraying Strategy
Spray Smart
Hash Cracking
When you have password hashes, crack them offline. No rate limiting, no lockouts - just raw computing power vs. hash strength.
Identifying Hashes
Hashcat
GPU-accelerated hash cracking. Incredibly fast.
John the Ripper
CPU-based, great format support, excellent for Unix hashes.
Wordlists & Rules
Essential Wordlists
Rule Files
Windows Hash Attacks
Pass-the-Hash
Linux Hash Attacks
Password Attack Methodology
Password Attack Process
Knowledge Check
Challenges
Key Takeaways
- Password spraying avoids lockouts by trying few passwords across many users
- Online attacks are slow; offline hash cracking is billions per second
- Hydra for network services, CrackMapExec for Windows environments
- Hashcat (GPU) is fastest, John the Ripper has best format support
- Pass-the-Hash lets you authenticate without cracking NTLM
- Custom wordlists based on target (CeWL, CUPP) are more effective
- Rules transform wordlists: password → Password1!