Sunday, 3 August 2014

Setting up and cracking! [Mac]


IntroHello, and welcome to my tutorial. If you – like me – are a Mac user, who’s been looking to get into Reverse Engineering, you’ve probably already Google’d around, finding nothing but useless stuff (Although, a few Mac RE’s actually exists. I’ll link my favourite in the ’Credits’). Well, I sat down one day, and just began reading,...

Cracking Hashes - How-to's And What-Not's


1. IntroIve seen a few requests for people to crack hashes, and some people aren't doing it right, just leaving a hash is not enough to help us help you.This tutorial will walk threw the basics and try and help you out in your future of hashing.2. HashesIt is common practice for most web programmers to secure passwords...

Common Types Of Password Cracking And Their Countermeasures


Social Engineering Social engineering is when a hacker takes advantage of trusting human beings to get information from them. For example, if the hacker was trying to get the password for a co-workers computer, he could call the co-worker pretending to be from the IT department. Social Engineering is used for different purposes. Countermeasure:If somebody tries to get...