| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
_NSAKEY After briefly touching on the general concept of password cracking, the focus of the talk will be on the effectiveness of different attack modes in hashcat, with an emphasis on time spent to run each attack. While the name of the talk is "hashcat," this talk will almost exclusively discuss the GPU-enabled versions (Specifically cudahashcat). The final phase of the talk will include an analysis of the known plaintext passwords from the test hash list, and my own experiments with creating a hashcat ruleset. Bio: _NSAKEY - confirmed abstract will send bio
Twitter: @_NSAKEY
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast