Advertisement · 728 × 90
#
Hashtag
#hashcracking
Advertisement · 728 × 90
Original post on infosec.exchange

So atom, main developer of @hashcat , used the "rapid prototyping in Python" plugin of the new "assimilation bridge" in the new hashcat 7, with some success in our DEF CON password CTF win this past weekend (hosted by @jabbercracky).

Afterwards, atom realized it would make a good case study for […]

0 1 0 0
Original post on infosec.exchange

Call for volunteer data:

Looking for real sets of hash-protected `known_hosts` files/records, to tune a cracking attack stacks on. The bigger the better.

Requirements: the cipher type and the fingerprint are not needed -- just need the hash and salt (first couple of base64 fields).

Individual […]

0 0 0 0

Me, elsewhere:

"Well ... I've been doing some things that are a good _substitute_ for understanding the [password cracking] target ... but I don't _actually_ understand the target. 😅"

#HashCracking

0 0 0 0
A page of six columns of 'passwords' of the form `ftp[IP]/`, in a yellow on black text terminal.

A page of six columns of 'passwords' of the form `ftp[IP]/`, in a yellow on black text terminal.

Whew! Good thing users will be blocked from using these compromised "passwords"! /s

0 0 0 0

Day 23 of #AdventOfCyber is in the can. It was fun brushing up on my hash cracking. #john #johntheripper #pdf2john #hacktheplanet #hashcracking #TryHackMe

0 0 0 0