Mastering Crunch the Powerful Password Generating Tool

Generate any type of passwords list using crunch tool
4.9 (12 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
998 students enrolled
$19
$50
62% off
Take This Course
  • Lectures 49
  • Length 4.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 7/2016 English

Course Description

If you can't offer the price of this course just send me a message.

Motivation

What motivates me to do this course is that I searched the net for a comprehensive tutorial that covers all the options of the crunch tool but I found no one did this!. Most of the tutorials cover only the basic use of the tool and some of the options. So I made this course to be a comprehensive and well-explained the tool in a great detail.

About the Crunch Tool:

Crunch is a very common word-list or passwords generator tool where you can specify a standard character set or a character set you specify. Crunch can generate all possible combinations and permutations. It is open-source, free, fast and an easy to use tool.

Crunch can create password list based on criteria you specify.  The output from crunch can be sent to the screen, file, or to another program.

About the Course:

In This course you will learn the basic use of the tool, using the tool options include advanced options and I will provide examples of each option. At the end of the course, you will master the use of the crunch tool.

Please note that this is a practical course, so we will doing a lot of examples and exercises.

Disclaimer:

This course is meant for educational purpose only,

I am not responsible for any damages arising from the misuse of the tools or course materials. Only use them legally.

What are the requirements?

  • Computer with Internet Connection
  • at least 10 GB of free Space and 2GB of Ram ( for windows and Mac users)
  • Basic Understanding of Computer

What am I going to get from this course?

  • Generate passwords list of any length from 1 to 128 digits.
  • Generate passwords list of any types consistence of lower case letters , upper case letters , numbers and special characters
  • Knowing how to choose a strong password and estimate the time to crack different types of passwords.
  • What makes a password weak or strong
  • Specify a pattern for the generated passwords list

What is the target audience?

  • Network Administrators
  • IT Security
  • Ethical Hackers and Pentesters

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Getting Started and Welcome to the Course!
00:31

Please Read this before you start the course. 

This course is meant for educational  purpose only,

I am not responsible for any damages arising from the misuse of the tools or course materials . only use them legally.

THANKS...

05:57


In this lecture I will introduce myself and we will have a general overview of the course materials and see if the course is suitable for you or not.

Section 2: Setup your Lab
01:21

Crunch tool definition and a general overview of the section materials

03:48

We will start by downloading the VirtualBox and Ubuntu Linux operating system . Later in this section we will use the VirtualBox to install Ubuntu Linux OS in our PC as a guest OS inside the VirtualBox.

Links :

VirtualBox : https://www.virtualbox.org/wiki/Downloads

Ubuntu : http://www.ubuntu.com/download/desktop


02:57

In this lecture we will start by installing the Virtual Box.

07:01

In this lecture we will start the installation of the Ubuntu OS inside the VirtualBox. as a guest OS.

04:20

We will continue the installation of Ubuntu and take an overview of the Ubuntu OS Interface and the command line terminal

03:15

the Guest Additions are designed to be installed inside a virtual machine
after the guest operating system has been installed. They consist of
device drivers and system applications that optimize the guest operating
system for better performance and usability.

05:10

We will download and install the crunch tool . we will use the commands ' make ' and ' make install ' to install crunch tool


Link  :

Download crunch from here : https://sourceforge.net/projects/crunch-wordlist/


Section 3: Basic use of Crunch with the Default Setting
05:15

in this lecture , I will explain the general format of the tool and the default use with default characters set.

05:42

More examples using crunch with the default setting.

06:57

In this lecture we will estimate the number of possible passwords that generated and the file size.

3 questions

Test your understanding of the tool with the default setting

Section 4: Dealing with character set
08:58

By default, crunch will use the character set of lower-case from a to z . In this lecture, I will show you how to use crunch with a custom character set like adBD34&$.

05:26

How to use space and backslash '\' as a part of the character set.

06:55

We will use the -f option to  set a predefined character set from charset.lst file

05:57

Find the default location of charset.lst file and search for it using the command find.

09:51

Editing the charset.lst File by editing/adding new character sets

5 questions

Test your understanding of using custom character set and charset.lst file.

Section 5: Writes the Ouput to a File
05:01

Save Result to a File Using the Option -o and how to use the 'cat' command to display a content of a file.

05:34

We will use another way to save the output to a file and solve the problem of overwriting. by using the greater than symbol ">" .

02:02

Use the -u option to disable the percentage of completed thread.

3 questions

Test your understanding of the ways of writing the output to a file.

Section 6: Get Help
05:48

Learn about the whatis command and the man page to get help and description of all options.

Section 7: Manage Output Files
03:54

Inverting the output file using -i option and learn how to list two files beside each others for easy comparison using the command paste.

01:29

Specify a starting point of a string using the -s option.

02:22

Specify an ending point of a string using the -e option.

07:29

Resuming a file generating Using the -r Option after it has been stopped. See the use of the rm, head,tail commands


Manage Output Files
4 questions
Section 8: Splitting , Compressing Output File
14:01

I will talk about splitting files using the -b option and some helpful command like ls -la , ll , rm

03:28

I will talk about splitting files using the -c option and some helpful command like cat -n , nl


11:32

. Compressing output file using -z option.
. type of supported compressing format.
. helpful command : ls -lS , ls lhS

Splitting , Compressing Output File
5 questions
Section 9: Filtering and Patterns
03:23

This lecture will cover the removing of duplicated consecutive lower case letters using -d option.

06:33

This lecture will cover the removing of duplicated consecutive upper case letters , numbers and symbols.

05:34

Generates patterns of lower case letters

04:10
Generates patterns from upper case , number and symbols
07:02

understand the Default charset using -t option and the use of plus sign 

04:34

How to deal with reserved symbols when using –t option

05:35

Using -l option to enable us to treat placeholder symbols as literals.

Using -d Option with -t
04:08
Filtering and Patterns
5 questions
Section 10: Combination and Permutation
Introduction to Combination and Permutation
01:10
07:12

Explains how crunch tool generates all possible numbers of wordlist

03:01

Explains what is permutation and how it can be used in crunch.

Removes Repetitive Characters Using -p Option Part 1
04:11
Removes Repetitive Characters Using -p Option Part 2
02:49
04:00

-q option is similar to -p option except that it read the input from file.

Using -t with -p Options
05:01
Combination and Permutation
3 questions
Section 11: Characteristics of a Strong Password
14:32

Estimate the time needed to crack a password according to PC specification.

04:19

Identify common passwords found in Dictionary list and technique used to crack these passwords.

Hybrid of Password
Preview
03:07
Common Passwords of You !
05:39
Characteristics of a Strong Password
4 questions
Section 12: Redirection
Redirect to head , more and cat tools
05:26
Section 13: Bonus lectures.
Coupons and Discounts
02:02

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Wael Al Rebh, Computer Engineer and IT specialist

 


Hi, my name is Wael Al Rebh . I have completed my Bachelors degree in Computer Engineering from king fahd university of petroleum and minerals (KFUPM) . [According to QS University Ranking , KFUPM is the top university in the middle east and the 199 in the world] . I have worked for more than 10 years in the IT field.  I have a Wide range of Knowledge in the computer field  including Windows OS , Linux OS , Programming , Networking and Security. 

I love to learn and teach .I spend most of my time learning. Now I decide to start teaching and I choose Udemy as a starting point of my journey.

 

Ready to start learning?
Take This Course