Custom password security algorithm? [duplicate]

How secure would it be if you applied custom algorithms (that you obviously wouldn’t reveal to the public) to a hashed password? Like splitting up a hashed string, shuffling it around, possibly even do something else with it to further shuffle it. Then shuffle it back and compare the user’s input to the original hash.

Then the next question, all of this shuffling is code, in a class, in a file. Can this not be reverse-engineered or somehow retrieved in some way?

Continue reading Custom password security algorithm? [duplicate]

MITM using ARP spoofing with Kali Linux running on VirtualBox with bridged wifi network adapter

At home I have two laptops (running on Windows). With one laptop (attacking laptop) I try to get in the middle of the connection of other laptop (victim laptop).

To do this is run Kali Linux in a virtual environment using Vi… Continue reading MITM using ARP spoofing with Kali Linux running on VirtualBox with bridged wifi network adapter