Automated Password Hacking (for the lazy hacker)

preview_player
Показать описание


📱Social Media📱
___________________________________________

💸Donate💸
___________________________________________
Like the channel? Please consider supporting me on Patreon:

Hacker Books:

My Build:

My Recording Equipment:

Рекомендации по теме
Комментарии
Автор

Thanks a lot heath for this great example. You've inspired me to automate more!
One comment for anyone that is going to copy this very code: In the video Heath is using -m 0 (that's md5 mode) in the 2 lines where the haschat command is, should be -m 1000 (NT hashes mode)

purplyak
Автор

Always love seeing a upload notification from The Cyber Mentor

NehaalPrasad
Автор

can we get a copy pasta version of this please.

adamjay
Автор

Bro I respect 🙏🙏🙏🙏 you are amazing I watched your Video on 4 years ago your hard work impressive don’t stop thank you bro

osamapy
Автор

Hey Heath, Awesome little script. I'm trying to think of ways to make it more efficient, but no luck yet. Going to add this to my list of tools.

master_of_bytes
Автор

Is the script available on your website or do we build it based on the video?

pcwwaydawn
Автор

I wouldn't call it lazy, more like smart 👍

ianmn
Автор

Hi Heath, thx for your nice video, i remember i saw on your TCM website in the PJPT section that it mentioned flexibility about the job nature of the cybersecurity professional where most of them have the flexibility of working from home. I am wondering what kind of position or job fit into this category and i am wondering if you can talk about this alittle bit more on your new video. Cause including myself i found a lot of people have responsibility to take care of kids and would like to get jobs that can be done working from home. Does any position in like red teaming or pen testing also possible to fit in this criteria, thx!

lambandbeeffish
Автор

hey make a video on open bullet and silver bullet config i dont see any big cyber content creators speaking on this web app attack tool??

ogbooker
Автор

Great video as usual, i think it will be a long time before I'm cracking passwords i only have a laptop. It does have a RTX 3080 so it might crack very short passwords :-)

MFoster
Автор

Hey, what are the certs required to get a job at your company TCM
Would love to know what certs companies look for in a candidate 😄

Sam-nCmf
Автор

Suppose a hacker were to obtain a user's USERID and the hash associated with the user's password, whether salted or not.

The hacker then modifies a browser such that rather than hashing the password and passing the hash to the login process, simply passes the stolen hash without modification. The login process would then interpret the incoming hash as valid password input and authenticate the user.

Why isn't this done? Or is it? What defense is there to prevent such a scenario?

brat
Автор

Is there a reason you do include the ability to use use the workload (-w ) argument as well as the optimize argument? I normally use -w 4 to speed things up a bit.

dakahuna
Автор

Is there anywhere we can just copy and paste the code?

alextippett
Автор

can i ask where are the NT hashes used (i´m beginer)

Lumikkk-rqjx
Автор

Hey buddy, I'm visiting this channel after 3 years and i was


Where is Orignal Cyber mentor? And Who's that new guy? 😅

Always_ready_for_security
Автор

How to unlock my Vivo v27 mobile password without data loss

Rokeys-ud
Автор

Make video on this
Title :- Most used tools by cyber security master.

Be_Confident
Автор

Hey heath I come here to ask for you help my email recently got locked as I forgot my backup codes I remember my password but it not the codes help me heath TvT.

Dracowins-zl
Автор

Can u please teach how to hack someone inst like i have logggin my friend account in my phone but he changed the password so ig it won't be that toug to hack as no security confirmation will required

codm
join shbcf.ru