1. Intro & Setup
  2. Objectives and Logistics
  3. Required Setup
  4. Password Extraction
  5. Guided Example
  6. Advanced Password Extraction
  7. Hashed Passwords
  8. Basic crypt Usage
  9. Advanced Authenticator
  10. Cracking Weak Passwords
  11. Basic Cracking
  12. Advanced Cracking