Abstract

Demo of Windows SAM file, Linux shadow file and CISCO Secret 5 Password cracking using John the Ripper.

Speaker

Asish

I am currently working at one of the Big 4 firms and has 4+ years of experience in Information Security consulting with focused expertise on Web Application Security, Infrastructure security, Penetration Testing, Vulnerability Assessment, Wireless Securit

Timing

Starts at Saturday April 26 2014, 01:00 PM. The sessions runs for 30 minutes.

Resources