Archive | Password Cracking

eBay Hacked – 128 Million Users To Reset Passwords

The big news this week is that the massive online auction site eBay has been hacked, the compromise appears to have taken place a few months around February/March but has only come to light recently when employee login credentials were used. This is 3 times bigger than the massive 42 Million passwords leaked by Cupid […]

Tags: , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Password Cracking, Web Hacking | Add a Comment

Blackhash – Audit Passwords Without Hashes

A traditional password audit typically involves extracting password hashes from systems and then sending those hashes to a third-party security auditor or an in-house security team. These security specialists have the knowledge and tools to effectively audit password hashes. They use password cracking software such as John the Ripper and Hashcat in an effort to […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Password Cracking | Add a Comment

hash-identifier – Identify Types Of Hashes Used To Encrypt Passwords

Somewhat similar to HashTag – Password Hash Type Identification (Identify Hashes) – which we posted about a while back, here we have hash-identifier or Hash ID. Once again this is a Python script created to identify types of hashes used to encrypt data and especially passwords. It supports a whole bunch of hashes such as […]

Tags: , , , , , , , ,

Posted in: Cryptography, Password Cracking | Add a Comment

PACK – Password Analysis & Cracking Kit

PACK (Password Analysis and Cracking Toolkit) is a collection of utilities developed to aid in analysis of password lists in order to enhance password cracking through pattern detection of masks, rules, character-sets and other password characteristics. The toolkit generates valid input files for Hashcat family of password crackers. Before using the PACK, you must establish […]

Tags: , , , ,

Posted in: Password Cracking | Add a Comment

The 25 Worst Passwords Of 2013 – “password” Is Not #1

The worst passwords of 2013 – really, more like the most common. The majority come from the massive Adobe leak, which contributed over 40 million passwords and skewed the data a fair bit pushing “photoshop” and “adobe123” into the list. Most of them are no surprise though, we published the top 10 most common passwords […]

Tags: , , , , , , ,

Posted in: Password Cracking, Privacy, Web Hacking | Add a Comment

THC-Hydra 7.5 Released – Fast Parallel Network Logon Cracker

Hydra is a parallelized network logon cracker which supports numerous protocols to attack, new modules are easy to add, beside that, it is flexible and very fast. Features IPv6 Support Graphic User Interface Internationalized support (RFC 4013) HTTP proxy support SOCKS proxy support The tool supports the following protocols –

And is faster in […]

Tags: , , , , , , ,

Posted in: Network Hacking, Password Cracking | Add a Comment

HashTag – Password Hash Type Identification (Identify Hashes) is a Python script written to parse and identify the password hash type used. HashTag supports the identification of over 250 hash types along with matching them to over 110 hashcat modes (use the command line switch -hc to output the hashcat modes). It is also able to identify a single hash, parse a […]

Tags: , , , , , , , , ,

Posted in: Cryptography, Password Cracking | Add a Comment

hashcat – Multi-Threaded Password Hash Cracking Tool

hashcat claims to be the world’s fastest CPU-based password recovery tool, while not as fast as GPU powered hash brute forcing (like CUDA-Multiforcer), it is still pretty fast. hashcat was written somewhere in the middle of 2009. Yes, there were already close-to-perfect working tools supporting rule-based attacks like “PasswordsPro”, “John The Ripper”. However for some […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Password Cracking | Add a Comment

Large Scale Botnet Brute Force Password Cracking Against WordPress Sites

There have always been a lot of brute force attempts/bot scans and hacking attempts on WordPress hosted sites (due to flaws in the core and a multitude of insecure plugins) – this site being no exception (they’ve even done some minor damage before). But things appear to have really ramped up recently with a large […]

Tags: , , , , , , , , ,

Posted in: Password Cracking, Web Hacking | Add a Comment

MySQL 1 Liner Hack Gives Root Access Without Password

The latest news that has hit the streets is the occurence of the easiest hack ever, if you have local shell access (any user privelege level) and you can connect to MySQL – you can get root access to MySQL within a few seconds. I tried this yesterday on one of my servers on Ubuntu […]

Tags: , , , , , , , , , ,

Posted in: Database Hacking, Exploits/Vulnerabilities, Linux Hacking, Password Cracking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·