Header Banner
Null Byte Logo
Null Byte
Cyber Weapons LabForumMetasploit BasicsFacebook HacksPassword CrackingTop Wi-Fi AdaptersWi-Fi HackingLinux BasicsMr. Robot Hacks Hack Like a Pro Forensics Recon Social Engineering Networking Basics Antivirus Evasion Spy Tactics MitM Advice from a Hacker
nullbyte.png

Password Cracking

Keyboard and lamp on a dark desk with glowing technology in the background.
Dec 19, 2019

There are many password-cracking tools out there, but one of the mainstays has always been John the Ripper. It's a powerful piece of software that can be configured and used in many different ways. Me ...

Code snippets showing various hashing algorithms and their implementations.
Dec 9, 2019

Hashes are commonly used to store sensitive information like credentials to avoid storing them in plaintext. With tools like Hashcat, it's possible to crack these hashes, but only if we know the algor ...

Code execution and password entry on a computer screen.
Jul 23, 2019

KeePassX, 1Password, and LastPass are effective against keyloggers, phishing, and database breaches, but passwords managers rely on the operating system's clipboard to securely move credentials from t ...

Microsoft building exterior with logo.
Jun 20, 2019

Microsoft Office files can be password-protected in order to prevent tampering and ensure data integrity. But password-protected documents from earlier versions of Office are susceptible to having the ...

"How to Create Rainbow Tables for Hashing Algorithms Like MD5, SHA1 & NTLM" cover image
Feb 5, 2019

A rainbow table can be thought of like a dictionary, except instead of words and their definitions, it holds combinations of characters on one side and their hashed form on the other. What is a hash a ...

"How to Exploit Recycled Credentials with H8mail to Break into User Accounts" cover image
Dec 14, 2018

Many online users worry about their accounts being breached by some master hacker, but the more likely scenario is falling victim to a bot written to use leaked passwords in data breaches from compani ...

Keyboard locked with a padlock and chain.
Aug 30, 2018

After gaining access to a root account, the next order of business is using that power to do something more significant. If the user passwords on the system can be obtained and cracked, an attacker ca ...

Code editor displaying terminal output and programming code.
Jul 4, 2018

Developers creating login systems know better than to store passwords in plain text, usually storing hashes of a password to prevent storing the credentials in a way a hacker could steal. Due to the w ...

Person coding on a laptop with a terminal open displaying red text.
Apr 13, 2018

Beginners learning brute-forcing attacks against WPA handshakes are often let down by the limitations of default wordlists like RockYou based on stolen passwords. The science of brute-forcing goes bey ...

Password in red with a digital binary background.
May 26, 2016

Welcome back, my tenderfoot hackers! Not too long ago, I showed how to find variousonlinedevices using Shodan. As you remember, Shodan is a different type of search engine. Instead of indexing the con ...