Mastering Crunch the Powerful Password Generating Tool

Generate any type of passwords list using crunch tool
4.9 (12 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
1,001 students enrolled
Sale Ends Today!
70% off
Take This Course
  • Lectures 50
  • Length 4.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 7/2016 English

Course Description

If you can't offer the price of this course just send me a message.


What motivates me to do this course is that I searched the net for a comprehensive tutorial that covers all the options of the crunch tool but I found no one did this!. Most of the tutorials cover only the basic use of the tool and some of the options. So I made this course to be a comprehensive and well-explained the tool in a great detail.

About the Crunch Tool:

Crunch is a very common word-list or passwords generator tool where you can specify a standard character set or a character set you specify. Crunch can generate all possible combinations and permutations. It is open-source, free, fast and an easy to use tool.

Crunch can create password list based on criteria you specify.  The output from crunch can be sent to the screen, file, or to another program.

About the Course:

In This course you will learn the basic use of the tool, using the tool options include advanced options and I will provide examples of each option. At the end of the course, you will master the use of the crunch tool.

Please note that this is a practical course, so we will doing a lot of examples and exercises.


This course is meant for educational purpose only,

I am not responsible for any damages arising from the misuse of the tools or course materials. Only use them legally.

What are the requirements?

  • Computer with Internet Connection
  • at least 10 GB of free Space and 2GB of Ram ( for windows and Mac users)
  • Basic Understanding of Computer

What am I going to get from this course?

  • Generate passwords list of any length from 1 to 128 digits.
  • Generate passwords list of any types consistence of lower case letters , upper case letters , numbers and special characters
  • Knowing how to choose a strong password and estimate the time to crack different types of passwords.
  • What makes a password weak or strong
  • Specify a pattern for the generated passwords list

Who is the target audience?

  • Network Administrators
  • IT Security
  • Ethical Hackers and Pentesters

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Getting Started and Welcome to the Course!

Please Read this before you start the course. 

This course is meant for educational  purpose only,

I am not responsible for any damages arising from the misuse of the tools or course materials . only use them legally.



In this lecture I will introduce myself and we will have a general overview of the course materials and see if the course is suitable for you or not.

Section 2: Setup your Lab

Crunch tool definition and a general overview of the section materials


We will start by downloading the VirtualBox and Ubuntu Linux operating system . Later in this section we will use the VirtualBox to install Ubuntu Linux OS in our PC as a guest OS inside the VirtualBox.

Links :

VirtualBox :

Ubuntu :


In this lecture we will start by installing the Virtual Box.


In this lecture we will start the installation of the Ubuntu OS inside the VirtualBox. as a guest OS.


We will continue the installation of Ubuntu and take an overview of the Ubuntu OS Interface and the command line terminal


the Guest Additions are designed to be installed inside a virtual machine
after the guest operating system has been installed. They consist of
device drivers and system applications that optimize the guest operating
system for better performance and usability.


We will download and install the crunch tool . we will use the commands ' make ' and ' make install ' to install crunch tool

Link  :

Download crunch from here :

Section 3: Basic use of Crunch with the Default Setting

in this lecture , I will explain the general format of the tool and the default use with default characters set.


More examples using crunch with the default setting.


In this lecture we will estimate the number of possible passwords that generated and the file size.

3 questions

Test your understanding of the tool with the default setting

Section 4: Dealing with character set

By default, crunch will use the character set of lower-case from a to z . In this lecture, I will show you how to use crunch with a custom character set like adBD34&$.


How to use space and backslash '\' as a part of the character set.


We will use the -f option to  set a predefined character set from charset.lst file


Find the default location of charset.lst file and search for it using the command find.


Editing the charset.lst File by editing/adding new character sets

5 questions

Test your understanding of using custom character set and charset.lst file.

Section 5: Writes the Ouput to a File

Save Result to a File Using the Option -o and how to use the 'cat' command to display a content of a file.


We will use another way to save the output to a file and solve the problem of overwriting. by using the greater than symbol ">" .


Use the -u option to disable the percentage of completed thread.

3 questions

Test your understanding of the ways of writing the output to a file.

Section 6: Get Help

Learn about the whatis command and the man page to get help and description of all options.

Section 7: Manage Output Files

Inverting the output file using -i option and learn how to list two files beside each others for easy comparison using the command paste.


Specify a starting point of a string using the -s option.


Specify an ending point of a string using the -e option.


Resuming a file generating Using the -r Option after it has been stopped. See the use of the rm, head,tail commands

Manage Output Files
4 questions
Section 8: Splitting , Compressing Output File

I will talk about splitting files using the -b option and some helpful command like ls -la , ll , rm


I will talk about splitting files using the -c option and some helpful command like cat -n , nl


. Compressing output file using -z option.
. type of supported compressing format.
. helpful command : ls -lS , ls lhS

Splitting , Compressing Output File
5 questions
Section 9: Filtering and Patterns

This lecture will cover the removing of duplicated consecutive lower case letters using -d option.


This lecture will cover the removing of duplicated consecutive upper case letters , numbers and symbols.


Generates patterns of lower case letters

Generates patterns from upper case , number and symbols

understand the Default charset using -t option and the use of plus sign 


How to deal with reserved symbols when using –t option


Using -l option to enable us to treat placeholder symbols as literals.

Using -d Option with -t
Filtering and Patterns
5 questions
Section 10: Combination and Permutation
Introduction to Combination and Permutation

Explains how crunch tool generates all possible numbers of wordlist


Explains what is permutation and how it can be used in crunch.

Removes Repetitive Characters Using -p Option Part 1
Removes Repetitive Characters Using -p Option Part 2

-q option is similar to -p option except that it read the input from file.

Using -t with -p Options
Combination and Permutation
3 questions
Section 11: Characteristics of a Strong Password

Estimate the time needed to crack a password according to PC specification.


Identify common passwords found in Dictionary list and technique used to crack these passwords.

Hybrid of Password
Common Passwords of You !
Characteristics of a Strong Password
4 questions
Section 12: Redirection
Redirect to head , more and cat tools

In this lectures I will show you how to redirect the output from crunch tool to the aircrack-ng

Section 13: Bonus lectures.
Coupons and Discounts

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Wael Al Rebh, Computer Engineer and IT specialist


Hi, my name is Wael Al Rebh . I have completed my Bachelors degree in Computer Engineering from king fahd university of petroleum and minerals (KFUPM) . [According to QS University Ranking , KFUPM is the top university in the middle east and the 199 in the world] . I have worked for more than 10 years in the IT field.  I have a Wide range of Knowledge in the computer field  including Windows OS , Linux OS , Programming , Networking and Security. 

I love to learn and teach .I spend most of my time learning. Now I decide to start teaching and I choose Udemy as a starting point of my journey.


Ready to start learning?
Take This Course