Removing The BIOS Administrator Password On A ThinkPad Takes Timing

In the olden days, an administrator password on a BIOS was a mere annoyance, one quickly remedied by powering off the system and pulling its CMOS battery or moving a jumper around. These days, you&…

Hackaday
Mandiant releases rainbow table that cracks weak admin password in 12 hours https://arstechni.ca/Ukpp #passwordcracking #Security #Biz&IT #hashes #ntlm
Mandiant releases rainbow table that cracks weak admin password in 12 hours

Windows laggards still using the vulnerable hashing function: Your days are numbered.

Ars Technica
Project Fail: Cracking A Laptop BIOS Password Using AI

Whenever you buy used computers there is a risk that they come with unpleasant surprises that are not of the insect variant. From Apple hardware that is iCloud-locked with the original owner MIA to…

Hackaday

If you are:

  • "abusing" hashcat --stdout or other cracking tools (or bulk string-generation tools) using GNU parallel, and

  • you're producing highly duplicate output per process, and

  • you need to do low-memory, best-effort dedupe in parallel, per process prior to passing the aggregated output to a final dedupe

... the dedupe tool included in CynosurePrime's rling repo:
https://github.com/Cynosureprime/rling

... really does the trick! Just do:

[parallel stuff] '[cmd] | dedupe' | final-process-thing

Thanks, @Waffle_Real !

#PasswordCracking

GitHub - Cynosureprime/rling: RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.

RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities. - GitHub - Cynosureprime/rling: RLI Next Gen (Rling), a faster multi-threaded, feature ri...

GitHub

@kibcol1049 nope nope nope nope nope :)
This chart is highly irrelevant for end-users and very deceptive if you don’t take it into the context of the full article it illustrates.

I crack +40 characters long passwords on a regular basis.

Don’t share this chart.

ping @tychotithonus ;)

#password #passwordcracking

FOSS Advent Calendar - Door 6: Cracking Passwords with John the Ripper

Today we explore John the Ripper, one of the most powerful and flexible open-source password-cracking tools. It is widely used for security testing, digital forensics, and understanding how weak passwords can be recovered.

John works by taking a password hash and trying to recover the original password. It can do this in different ways, for example through brute force, where every possible combination is tried, or through wordlists, where John tests passwords from a predefined dictionary. When the generated hash matches the original, the password is revealed.

This tool is perfect for learning about cybersecurity, testing the strength of your own passwords, or experimenting with how attackers might attempt to crack weak credentials.

Pro tip: try using both brute force and a wordlist. You’ll immediately see how effective wordlists can be compared to testing every combination.

Which hashing algorithm gives you the most headaches?

Link: https://github.com/openwall/john

#FOSS #OpenSource #Linux #CLI #Terminal #JohnTheRipper #CyberSecurity #PasswordCracking #SecurityTools #HashCracking #Pentesting #EthicalHacking #DigitalForensics #Unix #Infosec #NerdContent #TechNerds #AdventCalendar #OpenTools #FOSSAdvent #adventkalender #adventskalender

Allow us to reintroduce ourselves. The Hashcracky is a community hash cracking site for people of all skill levels. We host realistic time-locked password-cracking events designed to be fun and competitive for the cybersecurity and cryptographic communities with an arcade-inspired theme.

Hashcracky is created by cybersecurity professionals and teaches the skill of hash recovery. We focus on teaching the methodologies of hash cracking and providing a safe environment to study cybersecurity. Every hash is synthetic, so you can push your skills to the edge. Race the clock, collect loot, and battle your peers on a live leaderboard that only a select few ever reach.

We will be using this account to communicate events, winners, and other opportunities related to the community.

Great meeting you, and thanks for reading.
https://hashcracky.com/login

#introduction #hashcracky <- #jabbercracky #ctf #cybersecurity #passwordcracking #passwords

Hashcracky | Login

Log in to Hashcracky to crack hashes, collect loot, and climb the leaderboard.

Hashcracky

🔑 Password Security Tools – Awareness & Defense Guide 🛡️

Weak or reused passwords remain one of the biggest security risks. Security researchers and penetration testers use password auditing tools (in labs and authorized tests only) to identify vulnerabilities and help organizations enforce stronger authentication.

💡 Commonly Used Tools (Ethical Context Only):
1️⃣ John the Ripper – Classic password auditing tool for multiple formats.
2️⃣ Hashcat – GPU-powered password recovery tool, extremely fast.
3️⃣ Hydra – Network login password tester (SSH, FTP, RDP, HTTP, etc.).
4️⃣ Medusa – Parallel, modular password tester.
5️⃣ Cain & Abel (Legacy) – Windows password recovery & testing suite.

🛡️ Defense Strategies:
✔️ Enforce strong password policies (length, complexity, uniqueness).
✔️ Require Multi-Factor Authentication (MFA/2FA).
✔️ Regularly audit credentials and remove old accounts.
✔️ Use password managers to reduce reuse.
✔️ Monitor for credential leaks in threat intelligence feeds.

🌟 Why It Matters:
Password cracking tools highlight the danger of weak credentials. By understanding them, defenders can build stronger authentication systems and prevent breaches.

⚠️ Disclaimer:
This content is for educational and awareness purposes only. Password cracking tools should only be used in authorized environments with explicit permission. Unauthorized use is illegal and unethical.

#CyberSecurity #PasswordSecurity #InfoSec #EthicalHacking #PenTesting #BlueTeam #PasswordCracking #SecurityAwareness #EthicalTech #Authentication

So atom, main developer of @hashcat, used the "rapid prototyping in Python" plugin of the new "assimilation bridge" in the new hashcat 7¹, with some success in our DEF CON password CTF win this past weekend (hosted by @jabbercracky).

Afterwards, atom realized it would make a good case study for how to use the new feature, so he wrote it up:

https://hashcat.net/forum/thread-13346.html

If you do exploration of mystery hash types (either for CTFs, or in the real world) ... this approach should absolutely be in your toolbox.

¹Note that some work was done during the contest to make the Python bridge plugin better for these use cases; next minor release of 7 will have it, or grab hashcat.net/beta/ or the latest GitHub main branch.

#PasswordCracking #HashCracking
#hashcat #hashcat7

Using the Assimilation Bridge (Python Plugin) for Rapid Prototyping