hashes
China Cracks Apple Private Protocol — AirDrop Pwned
Richi Jennings | | Airdrop, Apple, Beijing Wangshendongjian, china, Chinese, Chinese Communists, Chinese drive-by attack, chinese government, Great Firewall of China, hash, hash algorithms, hash function, hash functions, hash generation, hashes, Peoples Republic of China, rainbow table, SB Blogwatch
AirDrop hashing is weaksauce: Chinese citizens using peer-to-peer wireless comms “must be identified.” ...
Security Boulevard
Extracting Kerberos Credentials from PCAP
Erik Hjelmvik | | crack, credentials, hashcat, hashes, John, JtR, Kali, KERBEROS, krb5asrep, krb5pa, krb5tgs, Linux, NetworkMinerCLI, passwords, pcap
NetworkMiner is one of the best tools around for extracting credentials, such as usernames and passwords, from PCAP files. The credential extraction feature is primarily designed for defenders, in order to analyze ...
Hash Hunting: Why File Hashes are Still Important
Travis Smith | | Featured Articles, Files, hashes, IT Security and Data Protection, security, Threat Intelligence
According to Gartner, threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable intelligence. When security research teams or government agencies release threat intelligence reports, some of the more tactical ...