Brute-forcing a six-digit MFA token in technically possible but not useful in practice.
Full disk encryption for Linux. We will be encrypting a single disk Linux installation using LVM, LUKS, and DM-Crypt.
Analysis of the Breach Compilation Dump. In short, 97% of the passwords are between 1-16 characters and a mixture of lowercase alphanumeric characters.
A short how-to for cracking DM-Crypt+LUKS block encryption passwords. Cracking LUKS passwords tend to take a long time because of the number of iterations used during the setup process. The process used to crack the passwords requires a binary dump of the header and some data. Then we use Hashcat to handle the cracking.
The process for cracking WPA/2 passwords is simple. capture the handshake between the access point and clients from the target network. crack the password with a password cracker like John the Ripper, Hashcat, or aircrack.
Cracking Password Protected RAR Archives with help from John the Ripper and Hashcat.
Cracking Password Protected ZIP Archives with help from John the Ripper and Hashcat.
A little information on what we are about.