Skip main navigation

Crack a Password Using a Rainbow Table: Part 2

This video will show some exercises, now that we have covered how to generate a rainbow table. Zanidd will also use a brute force attack to compare.

This video will show some exercises, now that we have covered how to generate a rainbow table.

Once you go into the rainbow directory, we will use a brute force attack and a rainbow attack, in order for you to compare the techniques.

Over to you: Having seen an example of both a brute force attack and a rainbow attack, what would you describe as the main differences between the two techniques?

Preparing for Test of the Week

Now that you completed the content steps for this week, you are ready for the test of the week!

The following test is going to assess your understanding of what you have learned within this past week of the course.

Remember, you do not have to take the test until you’re ready. To help you prepare, you might wish to spend some time refreshing your understanding of the contents of the past week.

You may wish to reflect on the Learning Outcomes introduced at the beginning of the week and make sure you are comfortable that you have met the requirements of each. Take some time to review your learning to help you prepare.

This article is from the free online

Advanced Cyber Security Training: Hands-On Password Attacks

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now