All Questions
5
questions
6
votes
10
answers
693
views
What are the guidelines for creation of a secure passwords?
What are the best practices to create secure passwords? I would like to make them tougher to crack with brute force tools.
Part II
Are there any tools that can generate these passwords so I do not ...
2
votes
1
answer
2k
views
Compute salt with known plaintext and hash?
I have the string that was used in a webapp with md5 hashing to come up with a hash. I also have the hash. But the md5 of the string doesn't match the hash, so I'm guessing there's a salt involved. Is ...
1
vote
1
answer
300
views
Creating a brute force "profile" based on past passwords
When attempting to brute force a password it can be helpful to minimize the time it needs by applying something like "mixed attacks". This question is mainly about optimizing such a mixed attack.
I ...
0
votes
2
answers
3k
views
How can I estimate the time it takes a certain computer to guess a password?
As cyber security and its exploitation become more prominent and relevant, I find websites such as https://howsecureismypassword.net/ to be very interesting. When the user enters a password, it ...
-1
votes
1
answer
1k
views
How do I recover the password to a gmail account with hydra? [closed]
hydra -S -l "$email" -P w_file -V -s 465 smtp.gmail.com smtp
Where email is just one one my gmail accounts and w_file is a file with three incorrect passwords and one correct (karina6c in ...