- network authenticaiton
- offline brute-force attack
- see wordlist generation
- john
- hashcat
- hash identification
- use
hashid <hash>
to list matching hash types. - OPSEC warning: Don’t submit the hash to online websites unless it’s for CTF challenges. Your client will not like the fact that you leaked hashes to the Internet.
- use