Akash Devcoolcoderr.hashnode.dev·Sep 6, 2023Brute Force Algorithms: The Power of Exhaustive SearchHey there, readers! 👋 This is the second article in my blog series, where we'll explore problems that can be solved using brute-force algorithms. In the previous article, I introduced this algorithm. If you haven't read it yet, please go check it ou...DiscussAlgorithms for Everyone: A Beginner’s Guide to Algorithm Design Techniquesbruteforcing
Alex Galhardoalexgalhardo.com·Aug 8, 2023Creating a Brute Force Attack Script to Find Secret Codehttps://youtu.be/JX0BNbhsHIQ Introduction It is quite common for systems to use 6-digit secret codes to authenticate users. Delivery is usually via email or SMS For example 435 657 Algorithm In this algorithm, using parallelism, the algorithm...Discussbruteforcing
Leokhaaleoo.hashnode.dev·Jul 21, 2023Security Risk - Timing Attack - Challenging but Entirely FeasibleTiming Attack is one of the techniques that hackers exploit by leveraging server-side computations to adjust attack payloads accordingly. In this article, I will present the most common example of this type of attack and discuss prevention methods us...Discuss·61 readsgolang
Stackzerostackzero.hashnode.dev·Jul 11, 2023How to Easily Create a zip password cracker in Just Seconds!If you’ve ever forgotten a password for a zip file, you know how frustrating it can be.There’s no need to worry anymore because in this article we’ll show you how to crack a zip password using a dictionary attack.Usually, zip files are protected with...DiscussPython
LoneD3VILunr-c1.eu.org·May 23, 2023How-to Brute-Force FTP Creds & Get Server AccessHackers frequently discover fascinating files in the unlikeliest of locations, FTP servers being one of them. If you're lucky, anonymous logins might occasionally be permitted, allowing anyone to sign in. But you'll almost always need a legitimate us...Discusshacking
LoneD3VILunr-c1.eu.org·May 19, 2023Create Custom Wordlists for Password Cracking Using the MentalistThe restrictions of default wordlists like RockYou based on stolen passwords frequently let down beginners learning brute-forcing attacks against WPA handshakes. By creating personalized wordlists, we can increase our efficiency beyond simply using t...Discuss·42 readscracking
Mihnea Octavian Manolachemihnea.hashnode.dev·Aug 2, 2022wpLockPicker: Brute Forcing WordPress with JavaScriptWhen it comes to pentesting or hacking in general, Python leads the way as one of the most popular programming languages. However, in recent years, JavaScript became very popular not just for its front-end strengths, but also for back-end. So, even t...Discuss·1 like·694 readspentesting
World of HackerforHack, Build & Scale - Web & Server appsworldofhacker.com·May 2, 2012Basic Idea of Creating Password Bruteforce toolIncludes 2 Basic Program :- Basic "C++" program. BruteForce Script in Python. Here is Sample Code of CPP Program, that will need Password :- Codes are messed up because of blogger. So Get a Code from here - https://github.com/krokite/basicBrut...Discuss·69 readshacker