Skip to main content

One post tagged with "Keyspace Technique"

The Keyspace Technique involves generating comprehensive lists of possible password combinations using tools like Crunch. It allows users to specify character sets (e.g., letters, numbers, symbols), minimum and maximum lengths, and other options to create a custom wordlist of potential passwords. This technique can be used to exhaustively try every possible combination within a given keyspace size.

View All Tags

THM | Password Attacks

· 27 min read

Red Teaming | Password Attacks | Summary:

This room is designed to teach about various strategies and techniques used in cracking or guessing passwords. It covers both offline and online methods, including dictionary and brute-force attacks, rule-based attacks, and custom rules.

The room emphasizes password profiling, teaching users how to create effective wordlists using default, weak, leaked, combined, and username sources.

Other topics include keyspace techniques, CUPP (Custom Password Profile), and online attacks targeting FTP, SMTP, SSH, and HTTP login pages. Additionally, it introduces the concept of password spraying attacks.