Hackers can break weak password storage mechanisms by using cracking methods that outline in this chapter. Many vendors and developers believe that passwords are safe from hackers if they don’t publish the source code for their encryption algorithms. After the code is cracked, it is soon distributed across the Internet and becomes public knowledge. Password-cracking utilities take advantage of weak password encryption. These utilities do the grunt work and can crack any password, given enough time and computing power. In order to be a security expert and penetration tester, you must understand how to crack administrator passwords.
The objective of this lab is to help students learn how to crack administrator passwords for ethical purposes. In this lab you will learn how to:
Use an LCP tool
Crack administrator passwords