Obfuscate a message with another string using compresssion and Base64 encoding.
Book Cipher for Binary Data Encryption.
RSA Number Prime Factoring (Now with code)
Opening the Travoce luggage combination lock without knowing the combination number.
Brute-forcing a six-digit MFA token in technically possible but not useful in practice.
Full disk encryption for Linux. We will be encrypting a single disk Linux installation using LVM, LUKS, and DM-Crypt.
Analysis of the Breach Compilation Dump. In short, 97% of the passwords are between 1-16 characters and a mixture of lowercase alphanumeric characters.
A short how-to for cracking DM-Crypt+LUKS block encryption passwords. Cracking LUKS passwords tend to take a long time because of the number of iterations used during the setup process. The process used to crack the passwords requires a binary dump of the header and some data. Then we use Hashcat to handle the cracking.
The process for cracking WPA/2 passwords is simple. capture the handshake between the access point and clients from the target network. crack the password with a password cracker like John the Ripper, Hashcat, or aircrack.
Cracking Password Protected RAR Archives with help from John the Ripper and Hashcat.