Search:

Type: Posts; User: lakiw; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.00 seconds.

  1. Replies
    9
    Views
    8,166

    Step 1: Install a keystroke logger Step 2: Wait...

    Step 1: Install a keystroke logger
    Step 2: Wait for you friend to log on
    Step 3: Profit

    Full hard drive encryption is tough to deal with. Technically it is also vulnerable to password cracking...
  2. Replies
    9
    Views
    3,229

    Thorion, a quick answer is that 9 users had the...

    Thorion, a quick answer is that 9 users had the exact same password as their e-mail address, aka fred@hotmail.com - password fred

    It will take me a little bit longer to figure out the answer to...
  3. Replies
    9
    Views
    3,229

    Analysis of 10k hotmail passwords

    Ok, not all of them were hotmail passwords, but that's how they are being talked about in the media

    Thousands of Hotmail passwords leaked online

    I did some initial analysis of the list which...
  4. Replies
    46
    Views
    20,226

    The attack described is a refinement of the...

    The attack described is a refinement of the ChopChop attack applied to WPA that was originally discovered by Martin Beck and Erik Tews. There's a couple of things to note about this attack that limit...
  5. Replies
    46
    Views
    20,226

    Not really. I'm writing a longer post on this,...

    Not really. I'm writing a longer post on this, but I need to get some sleep so it will have to wait till tomorrow. The short answer is, the attack described is only a slight improvement on the WPA...
  6. Replies
    5
    Views
    3,921

    Thanks for the reply. Since there's always hope I...

    Thanks for the reply. Since there's always hope I just want to clarify: I'm not trying to backup a truecrypt encrypted file. I'm trying to backup my unencrypted files to a truecrypt encrypted...
  7. Replies
    5
    Views
    3,921

    Truecrypt + Time Machine

    I'm trying to get Apple's Time Machine to back up to a TrueCrypt encrypted partition and failing horribly. I was able to get Time Machine to at least acknowledge my TrueCrypt partition by typing the...
  8. Replies
    18
    Views
    2,370

    This may not be what you are trying to do, but...

    This may not be what you are trying to do, but can't you just write a declaration after your initilizer, aka

    Shape rec;
    rec.x=5;
    rec.y=10;

    Since all typedef does is assign another name for...
  9. Discussioni: new version of crunch

    by lakiw
    Replies
    65
    Views
    16,979

    Just curious but what tool are you using for the...

    Just curious but what tool are you using for the WPA2 tables?
  10. Discussioni: new version of crunch

    by lakiw
    Replies
    65
    Views
    16,979

    Actually, the research idea behind the IBM paper...

    Actually, the research idea behind the IBM paper has the potential to be very useful. It's important to note that they aren't proposing a new type of cryptanalysis of existing encryption/hash...
  11. Replies
    4
    Views
    2,852

    I do something similar for my targeted brute...

    I do something similar for my targeted brute force attacks. For example if I want to run John the Ripper's incremental mode which uses markov models, but add a little logic I just use



    ./john...
  12. Replies
    4
    Views
    2,852

    I look forward to what you have to say. Maybe we...

    I look forward to what you have to say. Maybe we can stop hijacking the crunch thread with this discussion ;)

    *Post edited with firefox to see if it works
  13. Discussioni: new version of crunch

    by lakiw
    Replies
    65
    Views
    16,979

    Bofh28: Thanks for your reply. I have to disagree...

    Bofh28: Thanks for your reply. I have to disagree with you about saving the precomputed wordlist. I want to start though by saying that I do agree with you about the time-savings of rainbow tables....
  14. Discussioni: new version of crunch

    by lakiw
    Replies
    65
    Views
    16,979

    Virchanza, I agree with you that pre-generating...

    Virchanza, I agree with you that pre-generating an input dictionary generally isn't worthwhile. Even in the best case you are only looking at saving a couple of hours on an all day cracking session,...
  15. Discussioni: new version of crunch

    by lakiw
    Replies
    65
    Views
    16,979

    Here is part-2 of my tests to see if it is faster...

    Here is part-2 of my tests to see if it is faster to save the results of crunch to file or to run crunch during an actual password attack and pipe the output into your password cracker

    Experiment...
  16. Discussioni: new version of crunch

    by lakiw
    Replies
    65
    Views
    16,979

    Thanks for the reply. I have to say though that I...

    Thanks for the reply. I have to say though that I haven't noticed any speed-up by pre-generating the guesses. I fully understand the time v. storage trade-off for storing hashes, but in a brute force...
  17. Discussioni: new version of crunch

    by lakiw
    Replies
    65
    Views
    16,979

    I hate to ask such a newbie question, but why do...

    I hate to ask such a newbie question, but why do people save the output of crunch, (or programs like it), to file? It seems like a bit of a waste when you can just pipe it into programs like John the...
  18. Despite all the jokes about it, I've found the...

    Despite all the jokes about it, I've found the DISA gold disk decent for identifying potential problems in a windows pc, (it's not perfect but better than just about everything else. They really need...
  19. Replies
    4
    Views
    1,941

    Just a FYI but John the Ripper allows you to take...

    Just a FYI but John the Ripper allows you to take input from stdin, aka just use --stdin instead of --wordlist. It also allows you to output to stdout to another program. This way you don't have to...
  20. Replies
    17
    Views
    3,438

    Oh, and the computer's IP is probably one of the...

    Oh, and the computer's IP is probably one of the 169.254.0.x ones you saw. If not, (aka they have a static IP address), you should be able to detect it by doing passive sniffing, (hey someone is...
  21. Replies
    17
    Views
    3,438

    Ad hoc networks act kind of as a virus in...

    Ad hoc networks act kind of as a virus in Windows. Once you connect to one, if you computer is not currently connected to a network it will then becon out the old ad-hoc network. A good talk about...
  22. Discussioni: detecting sniffer

    by lakiw
    Replies
    6
    Views
    2,214

    I haven't played around with this myself so...

    I haven't played around with this myself so please take this with a grain of salt, but I've heard that...

    "It is possible to detect network interfaces in promiscuous mode by sending requests...
  23. Discussioni: MD5 Password Cracking

    by lakiw
    Replies
    14
    Views
    8,231

    As a reply to why John didn'g crack your test...

    As a reply to why John didn'g crack your test MD5, I almost guarentee it's due to trailing whitespace or a terminating character, (newline, etc). I've done a lot of password cracking, and when I...
  24. Discussioni: Nessus and BT2.0Final

    by lakiw
    Replies
    1
    Views
    1,213

    BTW, also forgot to mention, but it's to a new...

    BTW, also forgot to mention, but it's to a new hardrive install of BT2.0Final
  25. Discussioni: Nessus and BT2.0Final

    by lakiw
    Replies
    1
    Views
    1,213

    Nessus and BT2.0Final

    To start this off, I have done a search and read the other posts about installing Nessus to BT, but I'm getting a weird error.

    I'll download the RPM for Nessus and run rpm2tgz to get the tarball. ...
Results 1 to 25 of 28
Page 1 of 2 1 2