Step-by-Step Guide

Step-by-step guide: Cracking network passwords

Do you have a formal password policy for your Windows-based systems? Do you suspect that some of your network users have insecure passwords? If you answered yes to either of these questions, then now's a good time to check for password-related vulnerabilities on your network.

Passwords are often the first (and all too often, the last) line of defense to protect sensitive digital assets. Given that most Windows-based passwords (domain, Terminal Services, e-mail, etc.) tie back to the domain account, all it takes is one hole -- one entry point -- to get in and crack a password. Once that's done, anything is fair game. This is especially true with all the IIS-based applications, Citrix deployments, and other outward facing applications that so many organizations have in place today.

Requires Free Membership to View

Cracking network passwords

 Home: Introduction
 Step 1: Ethical hacking methodology
 Step 2: Tools you should use
 Step 3: What good are your findings?


Kevin Beaver is an information security consultant, keynote speaker, and expert witness with Atlanta-based Principle Logic, LLC where he specializes in performing independent security assessments.

This was first published in December 2005

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: