Skip to main content

All Questions

Tagged with
0 votes
4 answers
510 views

Attacks on password-based encryption

Frequent attacks on password-based encryption are dictionary attacks with special hardware. I suspect that this is the only promising attack on the ciphertext. Is that correct? Another attack ...
BeloumiX's user avatar
  • 256
2 votes
1 answer
1k views

Keyboard entry obfuscation to defy keyloggers?

Do you know of any existing mechanisms for keyboard-entry-obfuscation to defy keyloggers? And if that exists does software such as (and in particular) VeraCrypt feature these? If such mechanisms don'...
mYnDstrEAm's user avatar
1 vote
1 answer
117 views

Is there any tools out there to attack an unloaded system (on disk)

I was wondering : is there any tools related to unloaded system hacking ? I am asking this question because it seems to me that in a lot of case, people have access to random computer physical and ...
Omen's user avatar
  • 11
0 votes
0 answers
305 views

Secure password transfer from stdout to another window

I am currently trying to build a little, secure password manager. As of now, I've implemented the encryption. Each website has its own file and each file has a number of fields (Most commonly username ...
dzervas's user avatar
  • 332
12 votes
1 answer
4k views

How to study the packets sent by a keylogger

One of my friends runescape account got hacked through key-logger. He downloaded a runescape gold generator from a file sharing site and tried to use it. I have a strong doubt that it is a key-logger. ...
narayan's user avatar
  • 393