Password Cracking With John The Ripper – RAR/ZIP & Linux Passwords

Post Exploitation With Windows Credentials Editor (WCE) – Dump Windows Password Hashes

Brute Force Password Cracking With Medusa

How To Generate Wordlists With Crunch | Kali Linux

Kali Linux Quick Tips – #1 – Adding a non-root user

Linux Security – Securing Apache2

Linux Security – Configuring SUDO Access

Linux Security – SSH Security Essentials