#PasswordCracking

Ars Technica Newsarstechnica@c.im
2026-01-16

Mandiant releases rainbow table that cracks weak admin password in 12 hours arstechni.ca/Ukpp #passwordcracking #Security #Biz&IT #hashes #ntlm

2025-12-31

If you are:

  • "abusing" hashcat --stdout or other cracking tools (or bulk string-generation tools) using GNU parallel, and

  • you're producing highly duplicate output per process, and

  • you need to do low-memory, best-effort dedupe in parallel, per process prior to passing the aggregated output to a final dedupe

... the dedupe tool included in CynosurePrime's rling repo:
github.com/Cynosureprime/rling

... really does the trick! Just do:

[parallel stuff] '[cmd] | dedupe' | final-process-thing

Thanks, @Waffle_Real !

#PasswordCracking

2025-12-24

@kibcol1049 nope nope nope nope nope :)
This chart is highly irrelevant for end-users and very deceptive if you don’t take it into the context of the full article it illustrates.

I crack +40 characters long passwords on a regular basis.

Don’t share this chart.

ping @tychotithonus ;)

#password #passwordcracking

2025-12-05
FOSS Advent Calendar - Door 6: Cracking Passwords with John the Ripper

Today we explore John the Ripper, one of the most powerful and flexible open-source password-cracking tools. It is widely used for security testing, digital forensics, and understanding how weak passwords can be recovered.

John works by taking a password hash and trying to recover the original password. It can do this in different ways, for example through brute force, where every possible combination is tried, or through wordlists, where John tests passwords from a predefined dictionary. When the generated hash matches the original, the password is revealed.

This tool is perfect for learning about cybersecurity, testing the strength of your own passwords, or experimenting with how attackers might attempt to crack weak credentials.

Pro tip: try using both brute force and a wordlist. You’ll immediately see how effective wordlists can be compared to testing every combination.

Which hashing algorithm gives you the most headaches?

Link: https://github.com/openwall/john

#FOSS #OpenSource #Linux #CLI #Terminal #JohnTheRipper #CyberSecurity #PasswordCracking #SecurityTools #HashCracking #Pentesting #EthicalHacking #DigitalForensics #Unix #Infosec #NerdContent #TechNerds #AdventCalendar #OpenTools #FOSSAdvent #adventkalender #adventskalender
2025-10-22

Allow us to reintroduce ourselves. The Hashcracky is a community hash cracking site for people of all skill levels. We host realistic time-locked password-cracking events designed to be fun and competitive for the cybersecurity and cryptographic communities with an arcade-inspired theme.

Hashcracky is created by cybersecurity professionals and teaches the skill of hash recovery. We focus on teaching the methodologies of hash cracking and providing a safe environment to study cybersecurity. Every hash is synthetic, so you can push your skills to the edge. Race the clock, collect loot, and battle your peers on a live leaderboard that only a select few ever reach.

We will be using this account to communicate events, winners, and other opportunities related to the community.

Great meeting you, and thanks for reading.
hashcracky.com/login

#introduction #hashcracky <- #jabbercracky #ctf #cybersecurity #passwordcracking #passwords

2025-09-15

🔑 Password Security Tools – Awareness & Defense Guide 🛡️

Weak or reused passwords remain one of the biggest security risks. Security researchers and penetration testers use password auditing tools (in labs and authorized tests only) to identify vulnerabilities and help organizations enforce stronger authentication.

💡 Commonly Used Tools (Ethical Context Only):
1️⃣ John the Ripper – Classic password auditing tool for multiple formats.
2️⃣ Hashcat – GPU-powered password recovery tool, extremely fast.
3️⃣ Hydra – Network login password tester (SSH, FTP, RDP, HTTP, etc.).
4️⃣ Medusa – Parallel, modular password tester.
5️⃣ Cain & Abel (Legacy) – Windows password recovery & testing suite.

🛡️ Defense Strategies:
✔️ Enforce strong password policies (length, complexity, uniqueness).
✔️ Require Multi-Factor Authentication (MFA/2FA).
✔️ Regularly audit credentials and remove old accounts.
✔️ Use password managers to reduce reuse.
✔️ Monitor for credential leaks in threat intelligence feeds.

🌟 Why It Matters:
Password cracking tools highlight the danger of weak credentials. By understanding them, defenders can build stronger authentication systems and prevent breaches.

⚠️ Disclaimer:
This content is for educational and awareness purposes only. Password cracking tools should only be used in authorized environments with explicit permission. Unauthorized use is illegal and unethical.

#CyberSecurity #PasswordSecurity #InfoSec #EthicalHacking #PenTesting #BlueTeam #PasswordCracking #SecurityAwareness #EthicalTech #Authentication

2025-08-11

So atom, main developer of @hashcat, used the "rapid prototyping in Python" plugin of the new "assimilation bridge" in the new hashcat 7¹, with some success in our DEF CON password CTF win this past weekend (hosted by @jabbercracky).

Afterwards, atom realized it would make a good case study for how to use the new feature, so he wrote it up:

hashcat.net/forum/thread-13346

If you do exploration of mystery hash types (either for CTFs, or in the real world) ... this approach should absolutely be in your toolbox.

¹Note that some work was done during the contest to make the Python bridge plugin better for these use cases; next minor release of 7 will have it, or grab hashcat.net/beta/ or the latest GitHub main branch.

#PasswordCracking #HashCracking
#hashcat #hashcat7

Alec Muffettalecmuffett
2025-07-15

July 15th 1991: 34 years ago I published the first “modern” password cracker…
alecmuffett.com/article/113704

2025-07-14

July 15th 1991: 34 years ago I published the first “modern” password cracker…

…or, rather, smeared its development over a few months in response to requests from Unix systems administrators all over the globe – on the Internet and/or several other networks. It was a spark that still glows, but also helped inform the way Infosec developed as a discipline, notably arguments about full disclosure.

Gosh I feel old.

https://www.youtube.com/watch?v=BrxJlp_3utk

#computerHistory #crack #passwordCracking

Super cool write-up from the winning team of the CrackTheCon #passwordCracking contest.

hashmob.net/writeups/HashMob.n

2025-06-03

Well, this cracking attack is going to take 5.5 days on 2x 4090s.

#PasswordCracking #hashcat

Nicolas Cage as Ben in "Leaving Las Vegas." He's wearing a blue collared shirt, a suitcoat, and sunglasses. His body is facing the camera, but he is looking fully stage left. He's at a pawn shop, and has just been offered $500 for a 1993 Rolex Daytona. (In 1995, the year the film is set, it would probably have gone for a low five figures.) After a pause,  and with a smile of bemused abandon and ironic glee, he says ... "I'll do it".
N-gated Hacker Newsngate
2025-05-13

🚨 Oh no! GNU Screen has "security issues"—quick, everyone panic! Meanwhile, the tech wizards are too busy inventing new buzzwords and password-cracking supertools that sound like rejected Marvel villains to actually fix anything. 🙄🔧
openwall.com/lists/oss-securit

kriware :verified:kriware@infosec.exchange
2025-04-23

PDFRip: Multi-threaded PDF Password Cracking Utility

PDFRip is a Rust-based tool for cracking PDF passwords using dictionary attacks, date/number ranges, and custom queries.

github.com/mufeedvh/pdfrip

#PasswordCracking

2025-04-20

TIL if you generate and store all even faintly possible IPv4 IPs - 0.0.0.0 through 255.255.255.255 - as ASCII strings ... it takes about 58GB.

This is a #HaveIBeenPwned subtoot. 😜

#PasswordCracking

Redacted screenshot of cracking results against public HIBP hashes, in hash:plain potfile format. Hashes are redacted. Plaintexts show a pattern of a very common password, a space, the string 'http', and then the beginning of an IP address. The right-hand side of the image is truncated, so that only the beginnings of the IPs are shown.

Also, it should be immediately obvious that, despite their presence in the HIBP corpus, the likelihood of these plaintexts -- the result of bad parsing of infostealer data -- would *ever* be chosen by a real person approaches zero, which makes the value of using them to check for password reuse also approach zero.
2025-04-19

Password crackers:

If you're still mashing up all of your wordlists into a single monolithic file for deduplication purposes ... let me suggest an option that scales better, simply by approaching the problem differently:

Deduplicate each new source as it arrives, and then add it to a repository, by removing all strings already in your repository ...and then preserve it as a separate file! (You might call this the "sort once, deduplicate often" method.)

blog.techsolvency.com/2025/04/

The key benefit: the memory usage required is a factor of the size of the new file alone, rather than of the entire corpus.

Also useful for other medium-sized "dedupe a recurring stream of new sets of strings over time" use cases.

(And if you're not doing this anymore, now you have a reference to share with the folks who still are!)

#PasswordCracking

Top #hashcat tip:

Want per-position duplication in your rules to leverage your GPU?

It's not available in a single op, but you can emulate it by incrementally duplicating the first N chars, and then incrementally deleting the position and frequency of the redundant characters

#password #passwordcracking #pentest #redteam

halil denizhalildeniz
2025-01-27
2024-12-23

A CMD script to crack password protected ZIP, RAR, 7z and PDF files, using JohnTheRipper.

github.com/illsk1lls/ZipRipper

#zipcrack #password #passwordcracking #JohnTheRipper

2024-12-07

If you need to sort and dedupe a ton of strings/records, Cynosure Prime member blazer has released rlite, a 'lite' version of rling. I helped debug early versions. A nice balance of performant and simple, but with useful knobs like frequency counting, writing dupes to another file, etc.

(And heavy on the 'performant' - multi-threaded sort + dedupe time for 1.4B records in a 16GB file is 45 seconds on 48 EPYC 7642 cores, and uses 26GB of RAM)

github.com/Cynosureprime/rlite

#PasswordCracking

rlite usage output:

rlite 0.31-3320dbba7c by CynosurePrime (CsP)
A simplified version of the rling tool

Usage: rlite inputfile [ref1] [ref2] [ref3] [options]
Options:
        -t [threads]  Number of threads where MT is used
        -m            Enable lookup map, useful for high number of searches
        -o [file]     Output to a file, defaults to stdout
        -n            Do not remove duplicates
        -c            Write items in common between lists
        -l [len]      Limit matching up to a specified length
        -e [char]     Limit matching up to a specified character (not implemented)
        -p            Input list is pre-sorted, do not perform sort
        -D [file]     Write duplicates to file
        -r [dir]      Read and recurse a directory (not implemented)
        -L, --count   Line Count with longest count
        -q            Occurance analysis outputs as TSV format
        -j, --json    Output stats as json

Indexing modes:
        -i [file]     Index to file to disk
        -I            Index to file memory
        -b [num]      Select number of bits, 8-64bit supported, use with -i, -I and -m
        -s [file]     Use with -i [file] or -I, searches the specified index against -s [file]
        -k            Use with -s Keep misses on index, otherwise keep misses$ rlite -t 48 -o /dev/null hashmob-2024/hashmob.net_2024.found
No valid reference files specified, running in sort mode
Reading input: hashmob-2024/hashmob.net_2024.found
Total number of lines 1,413,428,404 Memory required (~26.51GBs)
Reading took 22.124 seconds
Sorting took 19.793 seconds
De-duplicating 1,413,332,469 unique (95,935 duplicate lines) took 2.244 seconds
Searching took 2.246 seconds
Writing took 1.138 seconds
Unique matches: 0 Wrote 1,413,332,469 lines
Total time took 45.301 seconds

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst