Releasing Rainbow Tables to Accelerate Protocol Deprecation | Google Cloud Blog

Mandiant aims to lower the barrier for security professionals to demonstrate the insecurity of Net-NTLMv1.

Google Cloud Blog
🎩👨‍🏫 Behold the modern-day Robin Hood of code, bravely arming kiddos with the arcane arts of SQL injection and rainbow tables! Because nothing says "bright future" quite like a classroom of mini-hackers, right? 🚸💻
https://www.hacktivate.app/why-teach-kids-to-hack #modernRobinHood #miniHackers #SQLInjection #codingEducation #rainbowTables #HackerNews #ngated
Hacktivate

Cybersecurity challenges for iPhone, iPad, and Mac

"The problem with rainbow tables is that they have uses¹, but if you're unsure whether you need them, then you really don't. And this creates a weird effect where the only people who use them ... don't need to ask about them." ~ Uly

#RainbowTables

¹https://hashcat.net/faq/rainbowtables

frequently_asked_questions [hashcat wiki]

Next time password cracking comes up conversationally and someone says "And can't you can just use rainbow tables" ... send them this.

https://hashcat.net/faq/rainbowtables

tl;dr They are only worthwhile in a very specific (and rare) set of circumstances.

#PasswordCracking #RainbowTables

frequently_asked_questions [hashcat wiki]

For some reason I didn’t have the NTLM-9 #RainbowTables #BitTorrent files listed on https://infocon.org/
Now fixed! It’s a big 6+ TB rainbow table.
InfoCon.org

InfoCon.org is an archive of hacking and security conference videos, documentaries, rainbow tables, word lists and podcasts.

La segunda parte del artículo de #criptografia para #dummies ya está disponible. Os contamos como funcionan los principales ataques y que se puede hacer para remediarlos

#ROOR7 #cryptography #seguridad #security #mitm #rainbowtables #replay #cyber

https://ibolcode.net/roor/2024-05-criptografia-para-dummies--parte-ii

Criptografía para Dummies. Parte II

<p>En esta segunda entrega de nuestra introducción a la criptografía para meros mortales vamos a explorar la criptografía desde un punto de vista más práctico. Veremos distintos tipos de ataques tanto para evitar las medidas de seguridad criptográficas de un determinado sistema, como para romper claves si fuera necesario.</p>

{ROOR} Revista On-line Occam's Razor
New Approach in the Rainbow Tables Method for Human-Like Passwords

This paper represents a new approach to rainbow tables, a method of password recovery that was originally developed by Martin E. Hellman and then improved by P. Oechslin, so most of its implementations use Oechslin's modification. An improvement represented in this work mostly lies in the reduction function, which uses character statistics to generate more "human-like" passwords. Though it generates passwords 5 to 10 times slower than reduction function, which uses direct dependency between hash bytes and the inserted characters, it significantly increases common efficiency in memory (8 to 30 times less memory needed to store these tables) and successful "human-like" passwords recovery probability, while these tables are generated by the same time as tables with the use of "random" reduction function.

Rainbow tables explained: How they work and why they’re (mostly) obsolete

Rainbow tables are password cracking tools with origins dating back to research from the early 1980s. Here's how they work, why attacks are easy to prevent, and how they compare to modern password cracking.

CSO Online

#Rainbowtables are #precomputed tables of #hashes used to #crack #passwords #Ophcrack is a free open-source #program that uses rainbow tables to crack #Windows log-in passwords. It can import hashes from a variety of formats, including dumping directly from the #SAM files of Windows, and can be run via the #commandline or using the program’s #gui

(1/7)

#itnostalgia

Apple AirDrop leaks user data like a sieve. Chinese authorities say they’re scooping it up.

Chinese authorities are exploiting a weakness Apple has allowed to go unfixed for 5 years.

Ars Technica