home.social

#johntheripper — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #johntheripper, aggregated by home.social.

  1. Did you know, John the Ripper can use hashcat rules?

    Unlike hashcat’s simple -r flag, JtR requires some manual setup in a conf file. @freeroute posted a step-by-step guide explaining how to do this.

    forum.hashpwn.net/post/2718

    #jtr #john #JohnTheRipper #hashcat #rules #hashcracking #infosec #howto #hashpwn

  2. Did you know, John the Ripper can use hashcat rules?

    Unlike hashcat’s simple -r flag, JtR requires some manual setup in a conf file. @freeroute posted a step-by-step guide explaining how to do this.

    forum.hashpwn.net/post/2718

    #jtr #john #JohnTheRipper #hashcat #rules #hashcracking #infosec #howto #hashpwn

  3. Did you know, John the Ripper can use hashcat rules?

    Unlike hashcat’s simple -r flag, JtR requires some manual setup in a conf file. @freeroute posted a step-by-step guide explaining how to do this.

    forum.hashpwn.net/post/2718

    #jtr #john #JohnTheRipper #hashcat #rules #hashcracking #infosec #howto #hashpwn

  4. Did you know, John the Ripper can use hashcat rules?

    Unlike hashcat’s simple -r flag, JtR requires some manual setup in a conf file. @freeroute posted a step-by-step guide explaining how to do this.

    forum.hashpwn.net/post/2718

    #jtr #john #JohnTheRipper #hashcat #rules #hashcracking #infosec #howto #hashpwn

  5. After seeing yescrypt hashes appear in CMIYC a while back, I started developing a yescrypt cracker in pure Go. Since then, yescrypt has become the default /etc/shadow hash for many popular linux distros such as Debian, Ubuntu, RHEL, Fedora, and Arch (to name a few), but hash cracking support for this algo has been limited to JtR -- until now.

    Here's a sneak peek of the yescrypt_cracker POC:

    forum.hashpwn.net/post/446

    #yescrypt #hashcracking #cyclone #hashpwn #hashcat #cmiyc #jtr #johntheripper #golang

  6. After seeing yescrypt hashes appear in CMIYC a while back, I started developing a yescrypt cracker in pure Go. Since then, yescrypt has become the default /etc/shadow hash for many popular linux distros such as Debian, Ubuntu, RHEL, Fedora, and Arch (to name a few), but hash cracking support for this algo has been limited to JtR -- until now.

    Here's a sneak peek of the yescrypt_cracker POC:

    forum.hashpwn.net/post/446

    #yescrypt #hashcracking #cyclone #hashpwn #hashcat #cmiyc #jtr #johntheripper #golang

  7. After seeing yescrypt hashes appear in CMIYC a while back, I started developing a yescrypt cracker in pure Go. Since then, yescrypt has become the default /etc/shadow hash for many popular linux distros such as Debian, Ubuntu, RHEL, Fedora, and Arch (to name a few), but hash cracking support for this algo has been limited to JtR -- until now.

    Here's a sneak peek of the yescrypt_cracker POC:

    forum.hashpwn.net/post/446

    #yescrypt #hashcracking #cyclone #hashpwn #hashcat #cmiyc #jtr #johntheripper #golang

  8. After seeing yescrypt hashes appear in CMIYC a while back, I started developing a yescrypt cracker in pure Go. Since then, yescrypt has become the default /etc/shadow hash for many popular linux distros such as Debian, Ubuntu, RHEL, Fedora, and Arch (to name a few), but hash cracking support for this algo has been limited to JtR -- until now.

    Here's a sneak peek of the yescrypt_cracker POC:

    forum.hashpwn.net/post/446

    #yescrypt #hashcracking #cyclone #hashpwn #hashcat #cmiyc #jtr #johntheripper #golang

  9. 1236 emails envoyés à autant d’utilisateurisses dont j’ai pu casser le mot de passe lors d’un audit.
    Si tout se passe bien, demain j’aurais de la lecture.

    #hashcat #JohnTheRipper #motdepasse #RSSI

  10. I was wondering if there is already #GPU #accelerated #bruteforcers for hash-to-curve
    datatracker.ietf.org/doc/rfc93 out there?
    and going beyond just "simple" h2c, 2hashdh prf H(pwd, H2c(pwd)^k) seems to be popular, might as well also inquire about their support. #opaque is one case where this is being used.

    does anyone know?

    #hashcat #johntheripper /cc @epixoip

  11. I was wondering if there is already #GPU #accelerated #bruteforcers for hash-to-curve
    datatracker.ietf.org/doc/rfc93 out there?
    and going beyond just "simple" h2c, 2hashdh prf H(pwd, H2c(pwd)^k) seems to be popular, might as well also inquire about their support. #opaque is one case where this is being used.

    does anyone know?

    #hashcat #johntheripper /cc @epixoip

  12. I was wondering if there is already #GPU #accelerated #bruteforcers for hash-to-curve
    datatracker.ietf.org/doc/rfc93 out there?
    and going beyond just "simple" h2c, 2hashdh prf H(pwd, H2c(pwd)^k) seems to be popular, might as well also inquire about their support. #opaque is one case where this is being used.

    does anyone know?

    #hashcat #johntheripper /cc @epixoip

  13. heise+ | Windows-Helfer: Nützliche Hacking-Tools für den Alltag

    Haben Sie ein Passwort vergessen oder wichtige Dateien versehentlich gelöscht? So schlüpfen Sie in die Rolle eines Hackers und verschaffen sich wieder Zugriff.
    Windows-Helfer: Nützliche Hacking-Tools für den Alltag