background preloader

Sheets 1

Facebook Twitter

About us Reverse Engineering b10g. Social Engineering - Security Through Education. Exploits Database by Offensive Security. Wordlists & Password Profiling with CRUNCH, WyD, & CUPP. Today I am going to show you how to use three (3) different tools in Linux (Backtrack 5) for creating targeted wordlists to help speed up and increase the chance of success for your dictionary attacks.

Wordlists & Password Profiling with CRUNCH, WyD, & CUPP

I will be covering the use of CRUNCH for pure wordlist generation, and then I will cover the use of WyD and CUPP which use password profiling techniques to create targeted wordlists to narrow your attacks. I will provide the written walk through here with a video at the end. Brutus - Download. Metasploit Unleashed. Remote-exploit.org. Oxid.it - Home. Spokeo.com - People Search. 123people.com. Spoke.com - Business Directory. Business Network - Social Network for Business Professionals.

ZoomInfo. Pipl - People Search. Free People Search by ZabaSearch! Free People Finder and Company Search. Free People Search. Addictomatic: Inhale the Web. Real Time Search - Social Mention. EntityCube. No. 1 free people search - Find anyone on the web. Tweepz.com - search, find and discover interesting people on twitter. Twitter Profile and Bio Search.