- Intro & Setup
- 1. Objectives and Logistics
- 2. Required Setup
- Password Extraction
- 3. Guided Example
- 4. Advanced Password Extraction
- Hashed Passwords
- 5. Basic crypt Usage
- 6. Advanced Authenticator
- Cracking Weak Passwords
- 7. Basic Cracking
- 8. Advanced Cracking