exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files

CUDA Cracking
Posted Apr 3, 2013
Authored by Rohit Shaw

This is a whitepaper that discusses using Compute Unified Device Architecture (CUDA) GPU cracking to crack passwords.

tags | paper
SHA-256 | 73c83fc3029646d3e3bb2f6758ef93e292ef63789d5c4c52472d85962bf1620e
Bios.Information.Leakage.txt
Posted Dec 14, 2005
Authored by Endrazine

Whitepaper discussing information leakage and password extraction from a BIOS.

tags | paper
SHA-256 | 11c0d68db3008a8f6d96bdaa51cd4f9d4990d59b038ddbb12e9e044505537b96
passwords.txt
Posted Nov 20, 2004

Password article that discusses common attacks and possible solutions.

tags | paper
SHA-256 | 3538e96f4db235417b69d3fe2694ab99b4e8ae7672633c45c99c2eb10fb74699
art_of_brute_forcing.txt
Posted Jun 29, 2003
Authored by Hi_Tech_Assassin | Site t3chware.net

Paper written about the art of brute force cracking that comes with example code.

tags | paper
SHA-256 | 45d8ad1042d40237b9961db4391407e13922af227ab3c00955c625e2a4c5e4fe
dodpwman.txt
Posted Oct 1, 1999

Department of Defense Password Management Guideline: Enumerates a number of good password management practices

tags | paper
SHA-256 | 6466f6042fc756932b8a33a461f5623b5255682b0d152c13602b9f9d31f6dabf
fips181.txt
Posted Oct 1, 1999

Standard for Automated Password Generator: Federal Information Processing Standard No 181

tags | paper
SHA-256 | 02952ef5f8c13c50eb6ce030fb7c7f1c01dd13574d86e18a35ba67c6136f1652
klein.ps
Posted Oct 1, 1999

Foiling the Cracker: A Survey of, and Improvements to, Password Security: Demonstrates the ease with which most passwords can be guessed by a motivated attacker

tags | paper
SHA-256 | 0a147e4aaa5a55b5df22688b5b2910670bc78fe97752153c82e53ff6193a664a
observe.ps
Posted Oct 1, 1999

Observing Reusable Password Choices: A method for observing password choices made by users, and how to protect it from being compromised

tags | paper
SHA-256 | c6f1afcd834b4c7d297d03eaa61d696bc81d6a11c24f131ec1bf3cda70d79cbe
opus.ps
Posted Oct 1, 1999

OPUS: Preventing Weak Password Choices. A system that uses Bloom filters to implement a constant-time dictionary lookup, regardless of dictionary size, to check a user's password choice for " goodness"

tags | paper
SHA-256 | 6b57074b96c811eaf86668faadb884f7bd2f8f172c78c23487e7c896d94214f0
passbib.ps
Posted Oct 1, 1999

User Authentication and Related Topics: An Annotated Bibliography

tags | paper
SHA-256 | 08245ddd0136802271b1e792765b6280b2980b7cae625f9140b0d398766bc550
pwstudy.ps
Posted Oct 1, 1999

Password Security: A Case History: A description of the original UNIX password algorithm, and the reasons for replacing it with the current one

tags | paper
systems | unix
SHA-256 | ca6cfc5f377dcf373bb18130b53ef90f3f7c98de4ae14a86a88535f94b44da03
pwtenyrs.ps
Posted Oct 1, 1999

UNIX Password Security - Ten Years Later: A reexamination of the UNIX password algorithm after ten years of advances in software and hardware

tags | paper
systems | unix
SHA-256 | 93aafb58b4907d97438db4c8dfea03f1de784857ae6b9580f04bf9c47c4c552f
skey.ps
Posted Oct 1, 1999

The S/Key One-Time Password System: A freely available implementation of one-time passwords

tags | paper
SHA-256 | e879730b059990d4238d75856c18b483acdcffeca91ba722865da85a07e9b3ec
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close