Purpose Recover weak passwords from hash files using wordlists, rules, masks and targeted wordlist generation. Subtopics • Hash types & quick generation (MD5, SHA1, NTLM) • John the Ripper: dictionary, incremental, show results • Hashcat: modes (-m), attack types (-a), rules, masks • Wordlist creation: Crunch, filtering, piping