John the Ripper is an excellent password cracking tool that I regularly use during penetration tests to recover plaintext passwords from multiple hash formats. I…
Just another hacking blog...
John the Ripper is an excellent password cracking tool that I regularly use during penetration tests to recover plaintext passwords from multiple hash formats. I…
I have multiple machines, some run Windows and some run Fedora. I also need to keep a significant amount of my data encrypted l, and I…
I recently purchased a Microsoft Surface Pro 4 which came with Windows 10. BitLocker was enabled by default during setup, however the recovery key was…
JavaScript Object Notation with Padding (JSONP) is a technique created by web developers to bypass the Same Origin Policy which enforced by browsers to prevent…
A common requirement on internal network assessments is to know the fully qualified Windows domain name of the network. This is trivial to obtain if…
LanManager is an obsolete hashing format used by older versions of Windows. It is extremely weak as it first splits the password into two 7…
Group Policy preferences were introduced by Microsoft in Windows 2008 allowing administrators to configure unmanaged settings (settings which the user can change) from a centrally…
On a recent Web application test I encountered a new challenge. The Web application presented a Web API intended to be used by a mobile…
When releasing tools, and proof of concepts, to the industry and more often to clients, I find I need to provide a standalone executable that can…
A recent project of mine called for optical character recognition. After a brief Google search and a personal recommendation I decided to use tesseract because it…