Defense against attacks using dictionaries
Some forms of attacks on passwords use dictionaries. It is safer to use nonsense passwords like YunSUanLin, Artibichoke, etc., which do not seem to pertain to any dictionary?
Collaborate Disseminate
Some forms of attacks on passwords use dictionaries. It is safer to use nonsense passwords like YunSUanLin, Artibichoke, etc., which do not seem to pertain to any dictionary?
Reading the new advice on password which seems to spead easily (at least in my workplace), I was wondering how to use hashcat for cracking four-word password hashes?
Say I have this hash 1da9133ab9dbd11d2937ec8d312e1e2569857… Continue reading Combined-Dictionary attack with hashcat, for 4 words passphrases?
So I’ve forgot a luks device passphrase, nothing critical but I’d like to have the content back. I kinda remember what it was about and the words included, but not the exact order of words, so instead of trying manually I’d l… Continue reading How to create a dictionary from a list of words and their permutations [on hold]
I am curious to know about the wifi attacks. And I have known a little bit about brute force attack and dictionary attack. Is there any other methods available other than these two…?
Continue reading Is there any methods available other than brute force and dictionary attacks?
I want to generate a wordlist of usernames that would suit the following cases:
Can be combined from several words depending on the case: “name”, “name + surname”, “name + surname + DOB”.
Username can contain special chara… Continue reading Generate wordlist of usernames for OSINT
1) If one iteration of MD5 takes x seconds, is it safe to assume that n iterations of MD5 takes n * x seconds?
2) Will salted and unsalted versions of md5 hash algorithms take approximately the same amount of time to compute… Continue reading How long does it take to compute hashes using the MD5 hash algorithm?
I need a rather long dictionary to bruteforce with, following a specific pattern:
I need it to combine words using the dictionary, to up to three words.
It wouldn’t be case sensitive, and it would use only words.
In the end, … Continue reading How to generate a bruteforce list?
I installed fcrackzip on Windows 10 and I’m currently cracking a zip file. When I don’t specify the -D and -p options ,the program runs brute force that we can see by adding another option -v. I think that the issue might be … Continue reading fcrackzip wordlist dictionary how to separate words? [on hold]
As part of pentesting NT hashes where the underlying passwords are minimum 16 characters of length, I have created a wordlist of common words, sports teams, movies, names, years etc. – inspired by the approach in this paper h… Continue reading Generating multi-word passphrases from a wordlist
Most dictionaries, as well as popular culture, mistakenly define “hacker” with a malicious connotation. It’s time to change that. Continue reading We Need to Change the Dictionary Definition of ‘Hacker’