Have you ever during a penetration test collected a list of values that look very much like hashes, and thought “I could maybe start cracking those, if I only knew what algorithm was used to calculate those hash values”. I had exactly this happen recently. In the past I've found any one of the dozens of lists of hash outputs on the net to be handy – Hashcat for instance has a pretty complete list posted ( http://hashcat.net/wiki/doku.php?id=example_hashes ). But this time I donned my googles and found the handy Hash Identifier python script at https://code.google.com/p/hash-identifier/ . This tool really saves a lot of work – these days my eyes are too old and my fingers are too big to be counting tiny characters in a hash string with any accuracy.Read More...
- NSA uses Google cookies to pinpoint targets for hacking December 12, 2013
- How to Create a Custom FortiClient Installer (v5.0) December 12, 2013
- Mandela memorial: View from Cape Town December 12, 2013
- Guidelines for trust service providers – Part 1: Security framework December 12, 2013
- Guidelines for trust service providers – Part 2: Risk assessment December 12, 2013
Tagsapi apple archives article browser bruce schneier business china copyright development director downloads education enterprise events facebook feeds gfi government hackers hacking infrastructure internet linkedin linux management microsoft network networks news opinion phishing podcasts science security social-media south-africa symantec team cyrmu technology united-kingdom united-states videos vulnerability windows