collection-placeholder.jpeg

Password Cracking

Article cover image
Aug 17, 2020

Everybody knows not to store sensitive information in unencrypted files, right? PDFs and ZIP files can often contain a treasure trove of information, ...

Article cover image
Aug 11, 2020

SSH is one of the most common protocols in use in modern IT infrastructures, and because of this, it can be a valuable attack vector for hackers. One ...

Article cover image
Jul 28, 2020

To name just a few companies, VK, µTorrent, and ClixSense all suffered significant data breaches at some point in the past. The leaked password databa ...

Article cover image
Jul 24, 2020

Secure Shell is one of the most common network protocols, typically used to manage remote machines through an encrypted connection. However, SSH is pr ...

Article cover image
May 4, 2020

Password cracking is a specialty of some hackers, and it's often thought that raw computing power trumps everything else. That is true in some cases, ...

Article cover image
Feb 17, 2020

The tactic of brute-forcing a login, i.e., trying many passwords very quickly until the correct one is discovered, can be easy for services like SSH o ...

Article cover image
Jan 16, 2020

With a simple social engineering trick, sudo passwords can be captured in seconds without the target's knowledge. The passwords can then be saved to a ...

Article cover image
Jan 14, 2020

Using Hydra, Ncrack, and other brute-forcing tools to crack passwords for the first time can be frustrating and confusing. To ease into the process, l ...

Article cover image
Jan 10, 2020

Brute-forcing is an easy way of discovering weak login credentials and is often one of the first steps when a hacker finds network services running on ...

Article cover image
Dec 20, 2019

Pyrit is one of the most powerful WPA/WPA2 cracking tools in a hacker's arsenal, with the ability to benchmark a computer's CPU speeds, analyze captur ...