Contextual Password Generation: Intro
Over the course of the next few weeks, I will be writing up a series of tutorials regarding what I call “Contextual Password Generation”. Essentially the concept is that, instead of using pure brute...
View ArticleContextual Wordlists
I had recently posted about my intentions to post some tutorials/work I’ve been thinking about regarding contextual password/wordlist generation. Life having gotten in the way, that has been delayed....
View ArticleContextual Wordlists Tools And Tactics: wyd
wyd is the first tool I review in my series on contextual wordlist tools and tactics. Essentially it will parse given files looking for actual words to dump into a wordlist. The intended aim of wyd can...
View ArticleJohn The Ripper With MPI And Additional Ciphers
So I was looking to use John the Ripper for cracking some hashes retrieved during an internal pen test. I’ve used John the Ripper for some time, and of course love it. With that, I also wanted to...
View ArticleAOL’s Quivering Pile Of Weakness
Matt Jezorek just wrote over at his blog about AOL truncating all passwords over 8 characters to only 8 characters, as well as not evaluating the case. This is obviously despite the fact that they...
View Article
More Pages to Explore .....