![]() In fact, both JTR and Hashcat have active development to this day. In discussing our typical run-down of hashing on John the Ripper (JTR) and Hashcat, the user responded with “I used that 15 years ago… people still do that”? The problem is they were still getting ridiculously slow hashing speeds making brute force unfitting. The question came from BHIS’s extended community who is using commercial password-recovery tools with distributed CPU and GPU processing power. I recently got a couple of questions about a better way to crack encrypted Excel files. Then we use a custom dictionary for pwnage in LinkedIn hash database. TLDR : We use a custom dictionary to crack Microsoft Office document encryption.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |