7habitsofhighlyeffectivehackers.blogspot.com
7 Habits of Highly Effective Hackers: Cracking the 3.5 Million Password Hashes That Were Redacted
http://7habitsofhighlyeffectivehackers.blogspot.com/2012/06/cracking-35-million-password-hashes.html
7 Habits of Highly Effective Hackers. Wednesday, June 6, 2012. Cracking the 3.5 Million Password Hashes That Were Redacted. The release of millions of SHA1 hashes from linkedin.com has the internet all buzzing today. but then comes the news that 3.5 million of them have the first 5 characters redacted and replaced with 00000. Well, if we don't have the entire hash we can't crack them. Oh wait, we still have the remaining 36 characters to do a comparison against. So let's try this:. It certainly raises co...
7habitsofhighlyeffectivehackers.blogspot.com
7 Habits of Highly Effective Hackers: April 2013
http://7habitsofhighlyeffectivehackers.blogspot.com/2013_04_01_archive.html
7 Habits of Highly Effective Hackers. Tuesday, April 23, 2013. Being a good internet citizen. A large percentage of breaches are discovered by having a third party mention to you that you're insecure. I would estimate it to be well over 50%. Because of that, when I come across things that are vulnerable I typically try to let the company know so they can fix it. Most of these are simple things that are indexed by google that were not meant to be public (see this post. So I sent them a simple email:.
7habitsofhighlyeffectivehackers.blogspot.com
7 Habits of Highly Effective Hackers: Thanks, and UtahSAINT Conference 2012
http://7habitsofhighlyeffectivehackers.blogspot.com/2012/08/thanks-and-utahsaint-conference-2012.html
7 Habits of Highly Effective Hackers. Wednesday, August 22, 2012. Thanks, and UtahSAINT Conference 2012. First off, I'd like to thank all those who have build on my proof of concept, Using twitter to build password cracking wordlist. Some of you have seriously taken it to the next level, and I applaud your efforts. Including, but not limited to:. Http:/ www.digininja.org/projects/twofi.php. Http:/ blog.hacktalk.net/twitscrape/. Http:/ www.damnsecure.org/? Nicely done, effective hackers. I love your site!
7habitsofhighlyeffectivehackers.blogspot.com
7 Habits of Highly Effective Hackers: June 2012
http://7habitsofhighlyeffectivehackers.blogspot.com/2012_06_01_archive.html
7 Habits of Highly Effective Hackers. Wednesday, June 6, 2012. Cracking the 3.5 Million Password Hashes That Were Redacted. The release of millions of SHA1 hashes from linkedin.com has the internet all buzzing today. but then comes the news that 3.5 million of them have the first 5 characters redacted and replaced with 00000. Well, if we don't have the entire hash we can't crack them. Oh wait, we still have the remaining 36 characters to do a comparison against. So let's try this:. I am an Information Se...
7habitsofhighlyeffectivehackers.blogspot.com
7 Habits of Highly Effective Hackers: August 2012
http://7habitsofhighlyeffectivehackers.blogspot.com/2012_08_01_archive.html
7 Habits of Highly Effective Hackers. Wednesday, August 22, 2012. Thanks, and UtahSAINT Conference 2012. First off, I'd like to thank all those who have build on my proof of concept, Using twitter to build password cracking wordlist. Some of you have seriously taken it to the next level, and I applaud your efforts. Including, but not limited to:. Http:/ www.digininja.org/projects/twofi.php. Http:/ blog.hacktalk.net/twitscrape/. Http:/ www.damnsecure.org/? Nicely done, effective hackers. When someone show...
7habitsofhighlyeffectivehackers.blogspot.com
7 Habits of Highly Effective Hackers: May 2012
http://7habitsofhighlyeffectivehackers.blogspot.com/2012_05_01_archive.html
7 Habits of Highly Effective Hackers. Thursday, May 31, 2012. Using twitter to build password cracking wordlist. This is going to be a quick one. We're going to show how to use twitter to build a word list for cracking passwords. We'll use John the Ripper, and as a target we'll use the MilitarySingles.com md5 password hashes that were released by the artist formerly known as lulzsec. EDIT: thanks to Supercow1127 and TheShadowFog for pointing out better ways to deal with JSON. See jshon, jsawk, etc).
7habitsofhighlyeffectivehackers.blogspot.com
7 Habits of Highly Effective Hackers: Can someone be targeted using the Adobe breach?
http://7habitsofhighlyeffectivehackers.blogspot.com/2013/11/can-someone-be-targeted-using-adobe.html
7 Habits of Highly Effective Hackers. Friday, November 1, 2013. Can someone be targeted using the Adobe breach? Note: As a professional courtesy to those at Adobe who are doing their absolute best to mitigate this breach, I have partially redacted all full hashes and email addresses from this blogpost, besides those found in the image published by arstechnica.com. We all know about the recent 153 Million account dump from Adobe. As arstechnica showed, the format looks something like this:. Now let's take...
7habitsofhighlyeffectivehackers.blogspot.com
7 Habits of Highly Effective Hackers: Being a good internet citizen
http://7habitsofhighlyeffectivehackers.blogspot.com/2013/04/being-good-internet-citizen.html
7 Habits of Highly Effective Hackers. Tuesday, April 23, 2013. Being a good internet citizen. A large percentage of breaches are discovered by having a third party mention to you that you're insecure. I would estimate it to be well over 50%. Because of that, when I come across things that are vulnerable I typically try to let the company know so they can fix it. Most of these are simple things that are indexed by google that were not meant to be public (see this post. So I sent them a simple email:.
7habitsofhighlyeffectivehackers.blogspot.com
7 Habits of Highly Effective Hackers: Habit 1
http://7habitsofhighlyeffectivehackers.blogspot.com/2013/01/i-gave-presentation-at-conference-last.html
7 Habits of Highly Effective Hackers. Thursday, January 31, 2013. I gave a presentation at a conference last year, and someone commented that if I have a blog called "the 7 habits of highly effective hackers", I should probably have a list of 7 actual habits on said blog. I guess that's fair. So here we go starting with habit 1, which I promise will be the only non-technical habit of the 7. Habit 1: Effective hackers know that the game they play IS the real world. The repercussions of your actions. I...
7habitsofhighlyeffectivehackers.blogspot.com
7 Habits of Highly Effective Hackers: Passively Cable Tapping Cat5
http://7habitsofhighlyeffectivehackers.blogspot.com/2012/08/passively-cable-tapping-cat5.html
7 Habits of Highly Effective Hackers. Wednesday, August 15, 2012. Passively Cable Tapping Cat5. When someone shows off a novel idea/solution they came up with, there are typically about a thousand people who rush in to say "You should have done it this way instead." Then others who attempt to build on the idea, and make it easier and even cooler. In this post I will attempt the latter. In the most recent edition of 2600, The Hacker Quarterly,. August 31, 2012 at 3:54 AM. September 4, 2012 at 12:56 PM.
SOCIAL ENGAGEMENT