In this course, you have learned to youse some common linux commands.

Hope you had fun learning! :-)

Hacking Secrets

Step 1 of 5


In this course you will learn about Hacking Secrets (private information) such as cracking passwords or finding hidden data in images (steganography) etc. These are ways of exploiting confidentiality.

The main tool we will be using is a tool known as John the Ripper (JTR). The way JTR works is it scans a wordlist and hashes each word in the list checking against another file with the password or the passwords hash, if the hash values match then you now that that is the password.

We will also be using Steghide which will find hidden data in images when given the correct password.

The purpose of this course is to learn how to exploit confidential (secrets) and private information so you can protect yourself against hackers stealing your information

This tab will not be visible to users and provides only information to help authors when creating content.

Creating Katacoda Scenarios

Thanks for creating Katacoda scenarios. This tab is designed to help you as an author have quick access the information you need when creating scenarios.

Here are some useful links to get you started.

Running Katacoda Workshops

If you are planning to use Katacoda for workshops, please contact [email protected] to arrange capacity.

Debugging Scenarios

Below is the response from any background scripts run or files uploaded. This stream can aid debugging scenarios.

If you still need assistance, please contact [email protected]