_NSAKEY
BSides Nashville 2015After briefly touching on the general concept of password cracking, the focus of the talk will be on the effectiveness of different attack modes in hashcat, with an emphasis on time spent to run each attack. While the name of the talk is "hashcat," this talk will almost exclusively discuss the GPU-enabled versions (Specifically cudahashcat). The final phase of the talk will include an analysis of the known plaintext passwords from the test hash list, and my own experiments with creating a hashcat ruleset.
Bio: _NSAKEY - confirmed abstract will send bio
Twitter: @_NSAKEY
I'm just a guy who likes to keep up with infosec news and dabble in related things as a hobby.
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek