MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Surviving Encryption: Cryptanalysis

Course Summary

The open-source approach


  • +

    Course Syllabus

    • Welcome & Introduction
      • Introduction
      • Practical 01 Comparing Protected Files Part 1
      • Comparing Protected Files Quiz
      • Practical 01 Comparing Protected Files Part 2
    • Dictionaries, Word Lists & Rainbow Tables
      • Lesson 02 Resources for Existing Wordlists for Dictionary Attacks
      • Practical 03 RSMangler: Creating a Per-mutated Custom Dictionary
      • Practical 04 Creating Wordlist from a Website using WinHTTrack & Bulk Extractor
      • Practical 05 Creating Word Lists from Memory and Image Files using Bulk Extracto
      • Practical 06 Mac Swap Files & Sleep Images
      • Practical 07 Mac Memory Extraction OS 10.4 - 10.8
      • Lesson 08 Mac Memory Extraction 10.9
      • Practical 09 Creating Rainbow Tables
    • Decryption Tools: User Login Passwords
      • Practical 10 Windows User Passwords (SAM Files)
      • Practical 11 Mac User Passwords: DaveGrohl
      • User Login Passwords Quiz
    • Decryption Tools: Mac Files
      • Practical 12 Mac Encrypted DMG Files & CrobarDMG
      • Practical 13 Mac Keychain Files
      • Mac Files Quiz
    • Decryption Tools: Inception
      • Practical 14 Inception
    • Decrytpion Tools: Volatility
      • Practical 15 Building a Paladin Forensic Virtual Machine
      • Practical 15 Volatility Part 1
      • Practical 15 Volatility Part 2
      • Practical 15 Volatility Part 3
      • Practical 15 Volatility Part 4
    • Decryption Tools: John the Ripper
      • Practical 16 John the Ripper on a PC Part 1
      • Practical 16 John the Ripper on a PC Part 2
      • Practical 16 John the Ripper on a PC Part 3
      • Practical 16 John the Ripper on a PC Part 4
      • Practical 16 John the Ripper on a PC Part 5
      • Practical 16 John the Ripper on a PC Part 6
    • Decryption Tools: Internet Passwords
      • Practical 17 Recovering Stored Internet Passwords
    • Decryption Tools: Hashcat
      • Practical 18A Hashcat Part 1
      • Practical 18A Hashcat Part 2
      • Practical 18A Hashcat Part 3
      • Practical 18A Hashcat Part 4
      • Practical 18A Hashcat Part 5
      • Practical 18A Hashcat Part 6
      • Practical 18A Hashcat Part 7
      • Practical 18A Hashcat Part 8
      • Practical 18A Hashcat Part 9
      • Practical 18B Hashcat: Mac User Hashes
      • Practical 18C Hashcat: Windows User Hashes
    • Conclusion
      • Conclusion


Course Fee:
USD 399

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

This course is listed under Open Source , IT Strategy & Management and IT Security & Architecture Community

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top