Can a secure key-exchange algorithm replace hashing for password authentication?

Over the weekend I was thinking about the problem of scaling various web services. One common practice to scale authorization is to use cryptographically signed tokens. This way when a request comes into your service you don’t need to look… Continue reading Can a secure key-exchange algorithm replace hashing for password authentication?

Certificate Signed Using Weak Hashing Algorithm impact on a workstation

I did a vulnerability scan on some of our company workstations. These are workstations used by employees (dev, HR, accounting, etc.) to do their job.
One of the common result I found is SSL/TLS Certificate Signed Using Weak Hashing Algorit… Continue reading Certificate Signed Using Weak Hashing Algorithm impact on a workstation

How to apply custom filters for John The Ripper when cracking RAR3 archive password?

My problem is that I’m trying to crack RAR file with is encrypted with RAR3 encryption.
Decided to try with John The Ripper.
Here are clues I have from my friend.

Max password length is 8
Only capital letters or digits

And I need now fil… Continue reading How to apply custom filters for John The Ripper when cracking RAR3 archive password?