Navigation : Administration Recon Malware Exploitation Post-Exploitation - Linux - Password cracking -- Hashcat -- John the Ripper -- Wordlist --- WPA-PSK - Windows Wordlist Wordlists and methodologies to build custom wordlists depending on the context: WPA-PSK