Password Attacks
Google Search - Default Credentials

Default Router Login Password For Top Router Models (2024 List)
Hashcat
Hashcat rules
Mask attack table
Placeholder
Meaning
Character Set
Cracking using combinator attack in hashcat
Crafting Wordlists
Generating Wordlists Using CEWL
Generating Wordlists of Username Conventions using username-anarchy
Create a custom wordlist with a OSINT
Generate 16,679,616 possible username combinations.
Crafting wordlist using kwprocessor
Examples:


John the Ripper
Locate john converter scripts
Something to John
Keepass to John
Cracking examples
Putty ppk to SSH
Cracking BitLocker Encrypted Drives
Cracking OpenSSL Encrypted Archives
Hashes known
Hash identifier tools
Password Spraying Office 365 (Microsoft Exchange environment)
Last updated
