J3bitokjebitok.hashnode.dev·Oct 28, 2024Cryptography: John the Ripper: The Basics (TryHackMe)In this article, I will write a write-up for John the Ripper: The Basics that the Basic Terms, Setting Up John on Your System, Cracking Basic Hashes, Cracking Windows Authentication Hashes, Cracking /etc/shadow Hashes, Single Crack Mode, Custom Rules...Discussrainbow-table
Perfect eLearningperfectelearning.hashnode.dev·Feb 26, 2024Cracking the Code: A Beginner's Guide to Linear Data StructuresUnlock the secrets of linear data structures with this beginner's guide, Cracking the Code. Learn foundational concepts and techniques. Introduction Embarking on the journey of coding often feels like stepping into a labyrinth of complexities. Howeve...Discusscracking
Derek Onwudiwetecheffect.hashnode.dev·Aug 16, 2023Demystifying Penetration Testing: Safeguarding Your Digital Assetsdetailed breakdown of each step in the penetration testing process along with their explanations: Information Gathering: In this phase, the penetration tester collects as much information as possible about the target system or network. This can inclu...Discusspenetration testing
Stackzerostackzero.hashnode.dev·Jul 11, 2023How to Easily Create a zip password cracker in Just Seconds!If you’ve ever forgotten a password for a zip file, you know how frustrating it can be.There’s no need to worry anymore because in this article we’ll show you how to crack a zip password using a dictionary attack.Usually, zip files are protected with...DiscussPython
LoneD3VILunr-c1.eu.org·May 19, 2023Create Custom Wordlists for Password Cracking Using the MentalistThe restrictions of default wordlists like RockYou based on stolen passwords frequently let down beginners learning brute-forcing attacks against WPA handshakes. By creating personalized wordlists, we can increase our efficiency beyond simply using t...Discuss·45 readscracking