Step 3: What good are your findings?
Weak passwords can be a huge security vulnerability. You can mitigate this risk by attempting to find your weaknesses before a malicious hacker does. Contributor Kevin Beaver provides a step-by-step guide on how to crack your own network passwords.
![]()
Cracking network passwords
![]()
Home: Introduction
Step 1: Ethical hacking methodology
Step 2: Tools you should use
Step 3: What good are your findings?
ABOUT THE AUTHOR: |
Kevin Beaver is an independent information security consultant, author and speaker with Atlanta-based Principle Logic LLC. He has more than 17 years of experience in IT and specializes in performing information security assessments. Beaver has written five books, including Hacking For Dummies (John Wiley & Sons, Inc.), the brand new Hacking Wireless Networks For Dummies and The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach Publications). He can be reached at kbeaver@principlelogic.com. Copyright 2005 TechTarget |
Start the conversation
0 comments