Nov
25
2013

Sharing My Email List

HackTalk Security Hash Cracking Practice
Share

Something I noticed quite a while back was that people like to use email addresses, or variations thereof, as their passwords. For example, someone with the email address of hacktalkisawesome@gmail.com could use the password “hacktalkisawesome” or numerous mutations thereof. Because of this I decided to start collecting email addresses that were disclosed as part of database leaks. I’m sharing that list with you all today for free :)

Share
Aug
21
2013

Protip: Cracking ALL The Hashes

Share

It never fails that I’ll get a partially cracked hash list from someone and realize that a lot of hashes remain and primarily due to the fact that a whole group of hash algorithms has been missed. This article will go over how I combat missing out on a hashing algorithm in place and often […]

Share
Aug
20
2013

Just Some Honeypot Results

Share

This is just a short post to share some results of running a honeypot for a few weeks in hopes of finding out the usernames and passwords people are using for bruteforcing to better gain an understanding of how password cracking and bruteforcing are being employed by live attackers.  

Share
Pages:1234567...79»
Get Adobe Flash player