reusablesec.blogspot.com reusablesec.blogspot.com

reusablesec.blogspot.com

Reusable Security

Password Cracking, Crypto, and General Security Research. Monday, December 22, 2014. Tool Deep Dive: PRINCE. PRINCE (PRobability INfinite Chained Elements). Jens Steube, (Atom from Hashcat). Linux, Mac, and Windows. It is a command line tool so it will work with any cracker that accepts input from stdin. 1/4/2015: Fixed some terminology after talking to Atom. 1/4/2015: Removed a part in the Algorithm Design section that talked about a bug that has since been fixed in version 0.13. You get the idea).

http://reusablesec.blogspot.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR REUSABLESEC.BLOGSPOT.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

May

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Monday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 3.3 out of 5 with 13 reviews
5 star
1
4 star
6
3 star
4
2 star
0
1 star
2

Hey there! Start your review of reusablesec.blogspot.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

0.1 seconds

FAVICON PREVIEW

  • reusablesec.blogspot.com

    16x16

  • reusablesec.blogspot.com

    32x32

  • reusablesec.blogspot.com

    64x64

  • reusablesec.blogspot.com

    128x128

CONTACTS AT REUSABLESEC.BLOGSPOT.COM

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
Reusable Security | reusablesec.blogspot.com Reviews
<META>
DESCRIPTION
Password Cracking, Crypto, and General Security Research. Monday, December 22, 2014. Tool Deep Dive: PRINCE. PRINCE (PRobability INfinite Chained Elements). Jens Steube, (Atom from Hashcat). Linux, Mac, and Windows. It is a command line tool so it will work with any cracker that accepts input from stdin. 1/4/2015: Fixed some terminology after talking to Atom. 1/4/2015: Removed a part in the Algorithm Design section that talked about a bug that has since been fixed in version 0.13. You get the idea).
<META>
KEYWORDS
1 skip to main
2 skip to sidebar
3 reusable security
4 tool name
5 version reviewed
6 author
7 os supported
8 password crackers supported
9 blog change history
10 brief description
CONTENT
Page content here
KEYWORDS ON
PAGE
skip to main,skip to sidebar,reusable security,tool name,version reviewed,author,os supported,password crackers supported,blog change history,brief description,4 letter word,algorithm design,aaaa,finding #1,aaaaa,aaaaaa,aaaaaaa,aaaaaaaa,biginput,aabb,cccc
SERVER
GSE
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

Reusable Security | reusablesec.blogspot.com Reviews

https://reusablesec.blogspot.com

Password Cracking, Crypto, and General Security Research. Monday, December 22, 2014. Tool Deep Dive: PRINCE. PRINCE (PRobability INfinite Chained Elements). Jens Steube, (Atom from Hashcat). Linux, Mac, and Windows. It is a command line tool so it will work with any cracker that accepts input from stdin. 1/4/2015: Fixed some terminology after talking to Atom. 1/4/2015: Removed a part in the Algorithm Design section that talked about a bug that has since been fixed in version 0.13. You get the idea).

INTERNAL PAGES

reusablesec.blogspot.com reusablesec.blogspot.com
1

Reusable Security: July 2010

http://reusablesec.blogspot.com/2010_07_01_archive.html

Password Cracking, Crypto, and General Security Research. Wednesday, July 28, 2010. Defcon Crack Me if You Can Competition. I'll be participating, though I certainly don't plan on winning. What I'm really looking forward to though is the chance to meet with everyone else and learn what other people are doing. I'm hoping this turns into an event like the lockpicking village with the contest being almost besides the point. Of course I might be saying that because I'm going to get creamed as well. I have to...

2

Reusable Security: CCS Paper Part #2: Password Entropy

http://reusablesec.blogspot.com/2010/10/ccs-paper-part-2-password-entropy.html

Password Cracking, Crypto, and General Security Research. Saturday, October 30, 2010. CCS Paper Part #2: Password Entropy. This is part #2 in a (mumble, cough, mumble) part serious of posts discussing the results published in the paper. I co-authored on the effectiveness of passwords security metrics. Part #1 can be found here. Claude Shannon was a smart dude. No seriously, he was amazing; He literally wrote the first book. On modern code-breaking techniques. Despite the similar sounding names, informati...

3

Reusable Security: December 2014

http://reusablesec.blogspot.com/2014_12_01_archive.html

Password Cracking, Crypto, and General Security Research. Monday, December 22, 2014. Tool Deep Dive: PRINCE. PRINCE (PRobability INfinite Chained Elements). Jens Steube, (Atom from Hashcat). Linux, Mac, and Windows. It is a command line tool so it will work with any cracker that accepts input from stdin. 1/4/2015: Fixed some terminology after talking to Atom. 1/4/2015: Removed a part in the Algorithm Design section that talked about a bug that has since been fixed in version 0.13. You get the idea).

4

Reusable Security: Defcon 17 Roundup

http://reusablesec.blogspot.com/2009/08/defcon-17-roundup.html

Password Cracking, Crypto, and General Security Research. Monday, August 10, 2009. It hardly seems like Defcon 17 was only a week ago. Right now it alternately feels like I just got back from it, or it happened a million years ago. Ok, I admit it. That link has nothing to do with this post, defcon, or even the idea of "a million years ago", but I stumbled across it in my Google search for something more appropriate and I thought I should share. Librarian hackers: need I say more? As the name implies, thi...

5

Reusable Security: The RockYou 32 Million Password List Top 100

http://reusablesec.blogspot.com/2009/12/rockyou-32-million-password-list-top.html

Password Cracking, Crypto, and General Security Research. Tuesday, December 29, 2009. The RockYou 32 Million Password List Top 100. But first, a quick responses to one of the previous comments, (since it really did merit a front-page post). The initial vulnerability was posted 29th November on a hacking forum called darkc0de here: http:/ forum.darkc0de.com/index.php? Now on to the main topic: Per Thorsheim. Well, that's one question down. Keep them coming! Thanks Matt, highly appreciated! No problem....

UPGRADE TO PREMIUM TO VIEW 15 MORE

TOTAL PAGES IN THIS WEBSITE

20

LINKS TO THIS WEBSITE

blog.sebastien.raveau.name blog.sebastien.raveau.name

Tricks of the Trade: A great loss

http://blog.sebastien.raveau.name/2013/11/a-great-loss.html

Tricks of the Trade. Monday, November 11, 2013. I wish I were breaking radio silence with something else but I just received confirmation that Cédric Blancher. The security researcher and friend whom I was referring to in my previous post, died in an accident yesterday. Subscribe to: Post Comments (Atom). View my complete profile. Follow me on Twitter. Joshua D. Abraham.

blog.sebastien.raveau.name blog.sebastien.raveau.name

Tricks of the Trade: Playing with DNS servers... some more

http://blog.sebastien.raveau.name/2009/02/playing-with-dns-servers-some-more.html

Tricks of the Trade. Tuesday, February 17, 2009. Playing with DNS servers. some more. Killing time in the metro by listening to podcasts of past security conferences, I got the idea of using DNS caches to check IP-spoofing capability. Now, the easiest way to check if you can send packets to the Internet with a fake source IP address would be with two computers (in different ASs), but that's no fun, is it? June 29, 2010 at 10:13 AM. Thanks to Archangel Amael from the Backtrack Forums for reporting the pro...

blog.sebastien.raveau.name blog.sebastien.raveau.name

Tricks of the Trade: February 2009

http://blog.sebastien.raveau.name/2009_02_01_archive.html

Tricks of the Trade. Tuesday, February 17, 2009. Playing with DNS servers. some more. Killing time in the metro by listening to podcasts of past security conferences, I got the idea of using DNS caches to check IP-spoofing capability. Now, the easiest way to check if you can send packets to the Internet with a fake source IP address would be with two computers (in different ASs), but that's no fun, is it? Subscribe to: Posts (Atom). View my complete profile. Follow me on Twitter. Joshua D. Abraham.

blog.sebastien.raveau.name blog.sebastien.raveau.name

Tricks of the Trade: December 2009

http://blog.sebastien.raveau.name/2009_12_01_archive.html

Tricks of the Trade. Sunday, December 6, 2009. On the legal uncertainty surrounding security education in France. By Cédric Blancher of EADS (in French sorry, automated translation to English here. Basically it discusses a highly subject to interpretation French law. That criminalizes informing people about dangers in Information Technology, and has me pulling my hair out to find interesting yet completely inoffensive. Stuff to tell you on Information Security. Subscribe to: Posts (Atom).

blog.sebastien.raveau.name blog.sebastien.raveau.name

Tricks of the Trade: April 2009

http://blog.sebastien.raveau.name/2009_04_01_archive.html

Tricks of the Trade. Friday, April 17, 2009. Just a quick tip before the big monthly blog post :-). Today I was asked by a friend if it was possible to assign different network interfaces to different programs for their Internet traffic. As bandwidth-intensive applications are often also the ones that don't really require privacy, one could imagine categorizing programs in a way so as to watch Internet TV over the Wi-Fi network while corresponding over the cable. Create a "wifi" user. Sudo -u wifi vlc.

digi.ninja digi.ninja

Pipal, Password Analyser - DigiNinja

https://digi.ninja/projects/pipal.php

Pipal, Password Analyser. On most internal pen-tests I do I generally manage to get a password dump from the DC. To do some basic analysis on this I wrote Counter. And since I originally released it I've made quite a few mods to it to generate extra stats that are useful when doing reports to management. Recently a good friend, n00bz. Who I'd like to give a big thanks to. Seeing as there have been so many changes to the underlying code I also decided to change the name ( see why. And do a full new release.

easymactips.blogspot.com easymactips.blogspot.com

Mac Tips and "How To" On a Mac: September 2012

http://easymactips.blogspot.com/2012_09_01_archive.html

Mac Tips and "How To" On a Mac. After 20 years on windows and pc, it took me 2 days on a Mac to realize that I wasted 20 years of my life on windows. Bummer. The highest form of ignorance is when you reject something you don't know anything about. Wayne Dyer (b 1940). John The Ripper Tutorial, Examples and Optimization. John The Ripper Mac Installation, Tutorial and Optimization. A while ago, I wrote this tutorial. On how to install the simple version (pre-compiled) of John The Ripper on a Mac. The insta...

blog.sebastien.raveau.name blog.sebastien.raveau.name

Tricks of the Trade: November 2013

http://blog.sebastien.raveau.name/2013_11_01_archive.html

Tricks of the Trade. Monday, November 11, 2013. I wish I were breaking radio silence with something else but I just received confirmation that Cédric Blancher. The security researcher and friend whom I was referring to in my previous post, died in an accident yesterday. Subscribe to: Posts (Atom). View my complete profile. Follow me on Twitter. Joshua D. Abraham.

blog.sebastien.raveau.name blog.sebastien.raveau.name

Tricks of the Trade: January 2009

http://blog.sebastien.raveau.name/2009_01_01_archive.html

Tricks of the Trade. Monday, January 12, 2009. More on encrypted repositories and the usage of EncFS. Judiciously pointed out to me, synchronizing block-ciphered data (typically Rsync EncFS in aes-256-cbc mode, which I mentioned yesterday) will induce a slight overhead on the amount of transferred data, because of block padding. This means software like Rsync could indeed benefit from internal support for repository-encryption. From the University of California and IBM shows. Feature is enabled in EncFS,...

blog.sebastien.raveau.name blog.sebastien.raveau.name

Tricks of the Trade: Per-process routing

http://blog.sebastien.raveau.name/2009/04/per-process-routing.html

Tricks of the Trade. Friday, April 17, 2009. Just a quick tip before the big monthly blog post :-). Today I was asked by a friend if it was possible to assign different network interfaces to different programs for their Internet traffic. As bandwidth-intensive applications are often also the ones that don't really require privacy, one could imagine categorizing programs in a way so as to watch Internet TV over the Wi-Fi network while corresponding over the cable. Create a "wifi" user. Sudo -u wifi vlc.

UPGRADE TO PREMIUM TO VIEW 12 MORE

TOTAL LINKS TO THIS WEBSITE

22

SOCIAL ENGAGEMENT



OTHER SITES

reusables.wavereaction.com reusables.wavereaction.com

Login - WAVE reusables

reusablesandwichwrap.co.uk reusablesandwichwrap.co.uk

Home

Aug 13, 2015. You are here : Home. Welcome to the Re-Wrap-It home page. The Reusable Sandwich Wrap. The Greatest Thing Since Sliced Bread! Not only does it keep the sandwich or food fresh inside, but it also unfolds into a plate. Ideal for keeping your desk clean or if you are eating outside. No more worrying about toddlers eating food from the floor or dirty picnic tables. Hand made in Scotland. No more wrapping up sandwiches or snacks then throwing the packaging away.

reusablesavings.com reusablesavings.com

reusablesavings.com

reusablescentral.com reusablescentral.com

Reusables Central | your trusted source

Bulk purchase / corporate purchase. Installation guide for Wood Impressions. Bags & totes. Kitchen & dining. Wood or social enterprise. Blossom Sling bag Large. GOODJOB is the leading brand of lifestyle bags and desktop accessories from Thailand. Established in 2005, found and architect Sujin Ostarayakul, teamed up with award winning designers Kiattichai Kheereesri and Pharata Sri-onnlha. GOODJOB’S. Blossom Sling bag Medium. Blossom Sling bag Small. Blossom Triangle bag Large. Deals Of The Day. Check out...

reusablesec.blogspot.com reusablesec.blogspot.com

Reusable Security

Password Cracking, Crypto, and General Security Research. Monday, December 22, 2014. Tool Deep Dive: PRINCE. PRINCE (PRobability INfinite Chained Elements). Jens Steube, (Atom from Hashcat). Linux, Mac, and Windows. It is a command line tool so it will work with any cracker that accepts input from stdin. 1/4/2015: Fixed some terminology after talking to Atom. 1/4/2015: Removed a part in the Algorithm Design section that talked about a bug that has since been fixed in version 0.13. You get the idea).

reusablesetc.com.au reusablesetc.com.au

Reusables Etc - safe, toxin free, eco friendly food and drinkware.

995 flat rate shipping, FREE shipping orders over $99*. Baby Bottles and Accessories. Sippy Cups and Accessories. Plates, Bowls, Utensils. View all baby and toddler. Travel Mugs and Cups. View all reusable cups. Stainless Steel Water Bottles. BPA Free Plastic Bottles. Filter and Infuser Bottles. View all water bottles. Sandwich and Snack Wrap. Lunch Boxes, Totes and Kits. Plates, Bowls and Utensils. View all lunch gear. Food Covers and Wraps. Food Storage Jars and Canisters. Plates, Bowls and Cutlery.

reusablesexchange.com reusablesexchange.com

HostGator - Please Configure Your Name Servers

Click Here for 24/7/365 Live Chat! Please configure your name servers. You're seeing this page because your domain is setup with the default name servers: ns1.hostgator.com. And ns2.hostgator.com. In order to point the domain to your server, please login here. To manage your domain's settings. You can find the name servers you need to use in your welcome email or HostGator control panel. For more information, please see this page. How can I avoid this in the future? How do I change my name servers?

reusableshop.com reusableshop.com

www.reusableshop.com

This page uses frames, but your browser doesn't support frames.