Exploit the possiblities
Showing 1 - 13 of 13 RSS Feed


CUDA Cracking
Posted Apr 3, 2013
Authored by Rohit Shaw

This is a whitepaper that discusses using Compute Unified Device Architecture (CUDA) GPU cracking to crack passwords.

tags | paper
MD5 | 88b5b63ab5a021be6ede8b93b7d52a17
Posted Dec 14, 2005
Authored by Endrazine

Whitepaper discussing information leakage and password extraction from a BIOS.

tags | paper
MD5 | 484b3c11908948f9c7311f87b66bf5e1
Posted Nov 20, 2004

Password article that discusses common attacks and possible solutions.

tags | paper
MD5 | 178ad30a02340076118e78e5635f87d7
Posted Jun 29, 2003
Authored by Hi_Tech_Assassin | Site t3chware.net

Paper written about the art of brute force cracking that comes with example code.

tags | paper
MD5 | 97b6bcfd74b5fe9ce55a5aa8cf7f0e8c
Posted Oct 1, 1999

Department of Defense Password Management Guideline: Enumerates a number of good password management practices

tags | paper
MD5 | 35c256b895bd29c27123833e43386a56
Posted Oct 1, 1999

Standard for Automated Password Generator: Federal Information Processing Standard No 181

tags | paper
MD5 | 0ad16ceab5c5acc0451a1d730b6cbdd1
Posted Oct 1, 1999

Foiling the Cracker: A Survey of, and Improvements to, Password Security: Demonstrates the ease with which most passwords can be guessed by a motivated attacker

tags | paper
MD5 | d4ec4e1eb00620466cf41ac2973da126
Posted Oct 1, 1999

Observing Reusable Password Choices: A method for observing password choices made by users, and how to protect it from being compromised

tags | paper
MD5 | 0bf911f81dc86a4d7e1cae890e3664ee
Posted Oct 1, 1999

OPUS: Preventing Weak Password Choices. A system that uses Bloom filters to implement a constant-time dictionary lookup, regardless of dictionary size, to check a user's password choice for " goodness"

tags | paper
MD5 | b478c75bd2448446dfe48dcb6ae7254d
Posted Oct 1, 1999

User Authentication and Related Topics: An Annotated Bibliography

tags | paper
MD5 | f06034f3296f337407bb218d2af952c0
Posted Oct 1, 1999

Password Security: A Case History: A description of the original UNIX password algorithm, and the reasons for replacing it with the current one

tags | paper
systems | unix
MD5 | 4b0c98ae2cc80812a1b4df0a69678dac
Posted Oct 1, 1999

UNIX Password Security - Ten Years Later: A reexamination of the UNIX password algorithm after ten years of advances in software and hardware

tags | paper
systems | unix
MD5 | add317fd31b7e8dcbfdbbcd011023202
Posted Oct 1, 1999

The S/Key One-Time Password System: A freely available implementation of one-time passwords

tags | paper
MD5 | ee1f52a1d51c28c229b9a49b08dadff2
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Kim Dotcom Sues New Zealand Government For Damages
Posted Jan 22, 2018

tags | headline, government, fraud, mpaa, new zealand
Hacker Jailed For DDoS Attacks Against Skype And Google
Posted Jan 22, 2018

tags | headline, hacker, microsoft, denial of service, google
Smut Site Fingered As Source Of A Million US Net Neutrality Comments
Posted Jan 22, 2018

tags | headline, government, usa, fraud
Twitter Begins Emailing The 677,775 Americans Who Took The Russian Election Bait
Posted Jan 22, 2018

tags | headline, government, usa, russia, fraud, cyberwar, twitter
Zyklon Password Stealer Exploits Microsoft Vulnerabilities
Posted Jan 20, 2018

tags | headline, malware, microsoft, flaw, password
EFF, Look Out Uncover Dark Caracal Spy Group
Posted Jan 20, 2018

tags | headline, privacy, spyware
OnePlus Confirms Hack Exposed Credit Cards Of Phone Buyers
Posted Jan 20, 2018

tags | headline, hacker, privacy, phone, data loss
Congress Demanded NSA Spying Reform. Instead, They Let You Down
Posted Jan 20, 2018

tags | headline, government, privacy, usa, fraud, spyware, nsa
Lebanese Government Hackers Hit Thousands Of Victims With Incredibly Simple Campaign
Posted Jan 19, 2018

tags | headline, government, malware, fraud, cyberwar, phish
Dridex Banking Trojan Compromises FTP Sites In New Campaign
Posted Jan 19, 2018

tags | headline, malware, bank, trojan, cybercrime, fraud
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By