background preloader

Why passwords have never been weaker—and crackers have never been stronger

In late 2010, Sean Brooks received three e-mails over a span of 30 hours warning that his accounts on LinkedIn, Battle.net, and other popular websites were at risk. He was tempted to dismiss them as hoaxes—until he noticed they included specifics that weren't typical of mass-produced phishing scams. The e-mails said that his login credentials for various Gawker websites had been exposed by hackers who rooted the sites' servers, then bragged about it online; if Brooks used the same e-mail and password for other accounts, they would be compromised too. The warnings Brooks and millions of other people received that December weren't fabrications. "The danger of weak password habits is becoming increasingly well-recognized," said Brooks, who at the time blogged about the warnings as the Program Associate for the Center for Democracy and Technology. The ancient art of password cracking has advanced further in the past five years than it did in the previous several decades combined.

password analysis and cracking kit | projects | sprawl PACK (Password Analysis and Cracking Toolkit) is a collection of utilities developed to aid in analysis of password lists in order to enhance password cracking through pattern detection of masks, rules, character-sets and other password characteristics. The toolkit generates valid input files for Hashcat family of password crackers. NOTE: The toolkit itself is not able to crack passwords, but instead designed to make operation of password crackers more efficient. Before we can begin using the toolkit we must establish a selection criteria of password lists. The most basic analysis that you can perform is simply obtaining most common length, character-set and other characteristics of passwords in the provided list. $ python statsgen.py rockyou.txt Below is the output from the above command: NOTE: You can reduce the number of outliers displayed by including the --hiderare flag which will not show any items with occurrence of less than 1%. ? For example, the very first mask, "? Using filters

Three Archaic Backdoor Trojan Programs That Still Serve Great Pranks : Learn-Networking.com There are several things that come to mind when talk of the 1990′s comes around. Nirvana, vodka, cheap rap, and well- global warming wasn’t the subject of every conversation. But what really outshines the rest is the world of computing. Today these programs won’t make it past a cheap firewall. Back Orifice / Back Orifice 2000 Back Orifice, or BO, is one of the more common backdoor programs- and one of the most lethal of the bunch. Pictured above is Back Orifice Version 2000. Companies such as Symantec have taken steps in guarding computers against the program, as they have deemed it as dangerous. Back Orifice 2000 is being developed for Windows 95, Windows 98, Windows NT, Windows 2000, and Windows XP. Where Can I Download Back Orifice 2000? Back Orifice 2000 may be downloaded at the following location: Removal of Back Orifice 2000 will require that you edit your registry settings. How To Remove Back Orifice 2000 1. NetBus / Netbus 2.0 Pro 1. 1.

BitLocker Drive Encryption Availability[edit] BitLocker is available in the Enterprise and Ultimate editions of Windows Vista and Windows 7. It is also available in the Pro and Enterprise editions of Windows 8.[4] Users of other versions of Windows that do not include BitLocker can use a third-party encryption program to satisfy the need for full disk encryption (see comparison of disk encryption software). In the RTM release of Windows Vista, only the operating system volume could be encrypted using the GUI; encrypting other volumes required using WMI-based scripts included in Windows Vista in the %Windir%\System32 folder.[5] An example of how to use the WMI interface is in the script manage-bde.wsf that can be used to set up and manage BitLocker from the command line. With Windows Vista Service Pack 1 and Windows Server 2008, volumes other than the operating system volume can be encrypted using the graphical Control Panel applet as well.[6] Overview[edit] Operation[edit] Security concerns[edit] See also[edit]

combinator_attack [hashcat wiki] Description Each word of a dictionary is appended to each word in a dictionary. Input If our dictionary contains the words: pass 12345 omg Test Output Hashcat creates the following password candidates: passpass pass12345 passomg passTest 12345pass 1234512345 12345omg 12345Test omgpass omg12345 omgomg omgTest Testpass Test12345 Testomg TestTest Combinator Attack Within oclhashcat-plus Using the Combinator Attack within oclhashcat-plus (not standalone version of Combinator Attack). The command for the Combinator Attack in oclhashcat-plus is -a 1 If you wish to add rules to either the left or right dictionary or both at once then you can use the -j or -k commands. -j, --rule-left=RULE Single rule applied to each word on the left dictionary -k, --rule-right=RULE Single rule applied to each word on the right dictionary Example. Dictionary 1 yellow green black blue Dictionary 2 car bike Commands -j $- -k $! The output would be… yellow-car! Supported by This attack is currently supported by:

Linux Book Pro Five digital trends that will transform the way you run your business Here are five fascinating trends that are about to turn the way we do business on its head. Technology enthusiast Kevin Kelly compared technology to a biological organism: a complex, evolving organism, that moves so fast it's often hard for us humans to keep up. There are plenty of fascinating movements in the digital space happening at any given moment. Today, we're looking a little closer at some of the trends in technology that will have an enormous effect on the way business works. 1. The term “the internet of things” has been floating around the world since 1999, when technologist Kevin Ashton suggested that soon computers would be capable of generating and collecting data without human supervision. Over 50 per cent of internet connections are things: there are about 15bn “things” on the web, with 50bn plus intermittent connections. Key technologies here include embedded sensors, and image recognition. There are plenty of other examples. 2.

Locking the bad guys out with asymmetric encryption Encryption, the transformation of data into a form that prevents anyone unauthorized from understanding that data, is a fundamental technology that enables online commerce, secure communication, and the protection of confidential information. Encryption algorithms are the mathematical formulae for performing these transformations. You provide an encryption algorithm with a key and the data you want to protect (the plaintext), and it produces an encrypted output (the ciphertext). To read the output, you need to feed the key and the ciphertext into a decryption algorithm (sometimes these are identical to encryption algorithms; other times they are closely related but different). Encryption algorithms are designed so that performing the decryption process is unfeasibly hard without knowing the key. The algorithms can be categorized in many different ways, but perhaps the most fundamental is the distinction between symmetric and asymmetric encryption. c = me (mod n) Decryption is similar:

Time Machine for every Unix out there - IMHO rsync is one of the tools that have gradually infiltrated my day to day tool-box (aside Vim and Zsh). Using rsync it’s very easy to mimic Mac OS X new feature called Time Machine. In this article I’ll show how to do it, but there is still a nice GUI missing – for those who like it shiny. What Time Machine does Time Machine makes a snapshot of your files every hour. So if you lose a file, or did a devastating change to one of your files, simply go back in time until you find your file or a version that’s not corrupted. Incrementally backing up all files every hour so that you can access them in reversed chronological order isn’t that hard with standard Unix utilities like rsync. Making full backups in no time every hour You can use this method to make a backup every hour or every ten minutes if you like. So, here the command to make the backup: rsync -aP --link-dest=PATHTO/$PREVIOUSBACKUP $SOURCE $CURRENTBACKUP Lets go through the parameters step by step. #! #! Advanced rsync parameters Hard-Links

Hacking Basics This tutorial is for information purposes only, and I do not endorse any of the activities discussed within this guide. I nor anyone hosting this guide can be held responsible for anything you do after reading this. What you do with your day lies on your shoulders. Here with I am creating an Index.. 1. Learning how to hack is simple. 2.Cracking commercial quantum cryptography secure communicating boxes with their internals exposed, Alice and Bob . 3.Top 10 Password Crackers Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with. 4.How to Hack a WiFi Network. you already know that if you want to lock down your Wi-Fi network, you should opt for WPA encryption because WEP is easy to crack. 5.Common Hacking Methods. 6.

Password crackers go green by immersing their GPUs in mineral oil Going where few password crackers have gone before, a team of security consultants has deployed a cracking-optimized computer that's completely submerged in mineral oil. Members say the setup offers significant cost savings compared with the same machine that uses air to stay cool. The rig contains two AMD Radeon 6990 graphics cards, long considered a workhorse for password crackers. While the parallel processing in just one of these $800 cards can make as many as 9 billion password guesses each second (see PC3 in the graph at the bottom of this page), the performance comes at a price. GPUs run extremely hot, particularly when combined with other graphics cards, which drives up the cost of keeping them cool enough to run without burning out. Employees of security consultancy KoreLogic recently deployed the password cracker at Midas Green Tech, an Austin, Texas-based data center that specializes in so-called immersion-cooled server hosting. "I've got this machine.

Related: