exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files

password.ps
Posted Oct 1, 1999

UNIX Password Security: A discussion of the importance of well-chosen passwords, and how passwords are cracked

tags | paper
systems | unix
SHA-256 | c8678acf4db6fbbcf4059305c7eb88ac5074fcae1a7fcb777e91c3266724a7a5

Related Files

Passwords 2015 Call For Papers
Posted Jul 13, 2015
Site passwordscon.org

Passwords 2015 has announced its Call For Papers. It will take place December 7th through the 9th, 2015 at the University of Cambridge, United Kingdom.

tags | paper, conference
SHA-256 | ca17f5045e83a93191564e0ddaa9800deae4ebbe38a38abddbe4598d8a79f7e9
PASSWORDS'14 Norway Call For Papers
Posted Sep 15, 2014
Authored by Per Thorsheim

The PASSWORDS'14 Norway Call For Papers has been announced. It will take place December 8th through the 10th, 2014 in Trondheim, Norway.

tags | paper, conference
SHA-256 | a270ae5136e49e09f525068c54f96fe43d036add98f294ae63d3bfe720c708fa
PasswordsCon 14 Call For Papers
Posted Mar 3, 2014
Authored by Per Thorsheim

The Passwords^14 Call For Papers has been announced. This year they will be teaming up with BsidesLV and it will be held August 5th and 6th, 2014 in Las Vegas, NV, USA.

tags | paper, conference
SHA-256 | 0e6de150d688bebe16bd35e0c270eef72a5d368e42d96e788440cfd04e133119
Passwords^13 Call For Submissions
Posted Oct 14, 2013
Authored by Per Thorsheim

The Passwords^13 Call For Submissions has been announced. It will be held December 2nd through the 3rd, 2013.

tags | paper, conference
SHA-256 | 3390c568b1f38f866637d47d3dd6eb69335f65c39bc82e9f2e71ecbaa112e9e2
Password Secrets Of Popular Windows Applications
Posted Sep 16, 2013
Authored by X3NON, F4RY4R_RED

Whitepaper called Password Secrets of Popular Windows Applications. Written in Persian.

tags | paper
systems | windows
SHA-256 | 2f2d636dd3b0d33b256e0011a95a9894ba4f4cdb485fd3aa852c13d9dd37e586
Passwords^12 Call For Presentations
Posted Aug 13, 2012
Authored by Per Thorsheim

The Passwords^12 Call For Presentations has been announced. It will be held at the University of Oslo (Norway) December 3rd through the 5th, 2012.

tags | paper, conference
SHA-256 | b22177219b2df9e74a0cd122fe1ebfc286c7578564e0f26ab3dbfd71aab4ac78
Password Generation Script
Posted Dec 7, 2011
Authored by Richard Braganza

This is a perl script that generates a list of passwords from user-supplied input on the command line. It enables a tester the ability to create various permutations of a given password for testing.

tags | cracker, perl
SHA-256 | 1eb229f6f284423c21b8d973d32dc10130512598abb5cd7062d67dedcbc04955
PASSWORDS^11 Call For Papers
Posted Mar 10, 2011
Authored by Per Thorsheim

The PASSWORDS^11 Call For Papers has been announced. It will be held at the University in Bergen (Norway) from June 7th through the 8th, 2011.

tags | paper, conference
SHA-256 | 65413d76a6624ad26c578a7d5c90e1ad2dc2905ed2048322c675737b75346a5c
Password Sniffing In Wireshark
Posted Aug 24, 2010
Authored by rOckHuntEr

Brief whitepaper touching on how to use Wireshark for password sniffing. Written in Arabic.

tags | paper
SHA-256 | 7eacf1df077b891bea39f52dc68658cd50ef625393d0cb2f6198e31cb0b0c56d
WholeHogSoftware Password Protect Insecure Cookie
Posted Feb 3, 2009
Authored by Stack | Site v4-team.com

WholeHogSoftware Password Protect suffers from an insecure cookie handling vulnerability.

tags | exploit, insecure cookie handling
SHA-256 | 879dcb888bd7acc1a852549d9d2bc10d3e78da75248890919d6c01b2efb8061c
Password Ganking By Modifying PHP Code
Posted Dec 30, 2008
Authored by Rohit Bansal

Brief login form password theft tutorial showing how to backdoor php code once access has been gained to a system in order to not have to crack hashes.

tags | paper, php
SHA-256 | efa9a5d70d121d1cd4ee5fd03891f3e0b9ec2ada0da46b4dc78a39dbc6a542b5
passwordsafe30.txt
Posted Apr 1, 2006
Site elcomsoft.com

PasswordSafe 3.0 has a weak random number generator.

tags | advisory
SHA-256 | 954e83279ee35055656c5f3c8533f0e6ef3820b4533a07b2d5c91e78d3510be2
PasswordSafe.txt
Posted Nov 20, 2005
Site elcomsoft.com

A design flaw in PasswordSafe allows for quicker brute force cracking attempts.

tags | advisory
SHA-256 | 5cba441313e89b00df5185e559ebc1f6aceaf29a9e02a60424f0b21d89a11067
passwords.txt
Posted Nov 20, 2004

Password article that discusses common attacks and possible solutions.

tags | paper
SHA-256 | 3538e96f4db235417b69d3fe2694ab99b4e8ae7672633c45c99c2eb10fb74699
unixhack.zip
Posted Aug 26, 2002

UNIX password security, and how long it would take

tags | bbs
systems | unix
SHA-256 | 4954e1a4f63572c0f8291099f0ca25504041d8e8e4e6309a5dce876ec83a6f6a
password.zip
Posted Aug 26, 2002

Default passwords for VAX/VMS, DEC-10, TOPS 10,

tags | bbs
systems | vax
SHA-256 | b78a809d7aa0681bebae4753b22f49f06d1cc29de774788f53d66f4668e95f83
SUPassConvert.tgz
Posted Nov 26, 2000
Authored by J Noonan | Site 2cic.com

The following is a utility I wrote to quickly convert the unix style passwords in a Serv-U.ini file into standard unix password style for cracking. Serv-U Ftp uses standard unix password encryption which can be cracked with most unix password crackers. I have included a java class file and a windows executable.

tags | java, cracker
systems | windows, unix
SHA-256 | bd53a0f1da06b52cfa763dd0a9ea301fa8b7ce85645ce817d57a0ea4143f1bc0
password.py.gz
Posted Jan 25, 2000
Authored by Dan Grassi

Quick Password is a program written in Python that generates passwords of user specified lengths which are easy to remember and pronounce. The passwords are reasonably secure and can easily be remembered because they are composed of dictionary words that are pronounceable joined by special characters. The program generates passwords of between 2 and 10 words each between 3 and 10 characters in length separated by non-alpha characters. It is usable as a web application from the home page if you do not wish to download it.

tags | web, python
systems | linux
SHA-256 | d6dabca6d18785695d9795744ba0c6fd12a1e673dfd26a9be02d799b1feac4c9
pwtenyrs.ps
Posted Oct 1, 1999

UNIX Password Security - Ten Years Later: A reexamination of the UNIX password algorithm after ten years of advances in software and hardware

tags | paper
systems | unix
SHA-256 | 93aafb58b4907d97438db4c8dfea03f1de784857ae6b9580f04bf9c47c4c552f
password-gen.c
Posted Aug 17, 1999
Authored by The c5 Project

A real simple password generator generating mixed upper and lowercase letters and numbers.

tags | cracker
SHA-256 | df65990c5d9286dd97eb763e639bbf8379e15b4a7063cd7c99f918626b5fdd37
asmcrk256.zip
Posted Aug 17, 1999
Authored by David Kuehling

ASMCrack v2.56 - ASMCrack is a unix password security tool. It checks the password file by trying whether a given word matches an encrypted password that was within the password file. To do so it uses very speed optimized 386 assembly routines, with pentium alignment and command order optimisations. ASMCrack supports five cracking modes: creating words by the login/geco field of the pwd file, and try these pwds only on the corresponding user, trying words, that are read from a dictionary file, creating words by Brute Force (e.g. aaa aab aac aad aae aaf aag ... zzy zzz), creating words by Smart Force (this is a statistic optimized modification of Brute Force, that is about 15 times more effective when cracking (pronouncable) pwds that only consist of letters), creating words by combining a certain number of syllables, that have been extracted from a dictionary file. ASMCrack supports parallel processing and clustered computing environments for increased cracking speed. This is the first public release of this program and it rivals John the Ripper in performance and speed.

tags | cracker
systems | unix
SHA-256 | 478efd1fd3515f29e70885e30573b34058c9a105c54b54754fd1def43b72bd0b
Page 1 of 1
Back1Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    32 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close