collection-placeholder.jpeg

Password Cracking

Article cover image
Dec 19, 2019

There are many password-cracking tools out there, but one of the mainstays has always been John the Ripper. It's a powerful piece of software that can ...

Article cover image
Dec 9, 2019

Hashes are commonly used to store sensitive information like credentials to avoid storing them in plaintext. With tools like Hashcat, it's possible to ...

Article cover image
Jul 23, 2019

KeePassX, 1Password, and LastPass are effective against keyloggers, phishing, and database breaches, but passwords managers rely on the operating syst ...

Article cover image
Jun 20, 2019

Microsoft Office files can be password-protected in order to prevent tampering and ensure data integrity. But password-protected documents from earlie ...

Article cover image
Feb 5, 2019

A rainbow table can be thought of like a dictionary, except instead of words and their definitions, it holds combinations of characters on one side an ...

Article cover image
Dec 14, 2018

Many online users worry about their accounts being breached by some master hacker, but the more likely scenario is falling victim to a bot written to ...

Article cover image
Aug 30, 2018

After gaining access to a root account, the next order of business is using that power to do something more significant. If the user passwords on the ...

Article cover image
Jul 4, 2018

Developers creating login systems know better than to store passwords in plain text, usually storing hashes of a password to prevent storing the crede ...

Article cover image
Apr 13, 2018

Beginners learning brute-forcing attacks against WPA handshakes are often let down by the limitations of default wordlists like RockYou based on stole ...

Article cover image
May 26, 2016

Welcome back, my tenderfoot hackers!Not too long ago, I showed how to find variousonlinedevices using Shodan. As you remember, Shodan is a different t ...