Overview
This lab simulated network attacks and security testing to evaluate the robustness of a local network.
Tools like nmap, hashcat, and john were used to perform dictionary attacks and compare the performance of different hash algorithms (MD5, SHA1, SHA256).
Key Learnings
- Network discovery and scanning with Nmap
- Dictionary attacks and password hash analysis
- SSH connection security best practices