❌

Reading view

WifiForge – WiFi Exploitation for the Classroom

by William Oldert // BHIS Intern BHIS had a problem. Β  We needed an environment for students to learn WiFi hacking safely. Our original solution used interconnected physical network gear […]

The post WifiForge – WiFi Exploitation for the Classroom appeared first on Black Hills Information Security, Inc..

  •  

PNPT: Certification Review

Daniel Pizarro // What is the PNPT?Β  The Practical Network Penetration Tester (PNPT), created by TCM Security (TCMS), is a 5-day ethical hacking certification exam that assesses a pentester’s ability […]

The post PNPT: Certification Review appeared first on Black Hills Information Security, Inc..

  •  

Podcast: Passwords: You Are the Weakest Link

Why are companies still recommending an 8-character password minimum?Β  Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment.Β Multiple service providers recommend […]

The post Podcast: Passwords: You Are the Weakest Link appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

  •  

The Paper Password Manager

Michael Allen // Every year around the holidays I end up having a conversation with at least one friend or family member about the importance of choosing unique passwords for […]

The post The Paper Password Manager appeared first on Black Hills Information Security, Inc..

  •  

Webcast: Passwords: You Are the Weakest Link

Why are companies still recommending an 8-character password minimum?Β  Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment.Β Multiple service providers recommend […]

The post Webcast: Passwords: You Are the Weakest Link appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

  •  

Passwords: Our First Line of Defense

Darin Roberts // β€œWhy do you recommend a 15-character password policy when (name your favorite policy here) recommends only 8-character minimum passwords?” I have had this question posed to me […]

The post Passwords: Our First Line of Defense appeared first on Black Hills Information Security, Inc..

  •  

Cracking Passwords with Umlauts

Carrie Roberts // *Guest Blog You have a password hash you would like to crack for a password that contains an Umlaut. You know, the two dots over a letter […]

The post Cracking Passwords with Umlauts appeared first on Black Hills Information Security, Inc..

  •  

Webcast: Attack Tactics 5 – Zero to Hero Attack

Timecode links take you to YouTube: 4:11 – Infrastructure & Background8:28 – Overview & Breakdown of Attack Methodology and Plans11:35 – Start of Attack (Gaining Access), Password Spraying Toolkit15:24 – […]

The post Webcast: Attack Tactics 5 – Zero to Hero Attack appeared first on Black Hills Information Security, Inc..

  •  

How I Cracked a 128-bit Password

Sally Vandeven// TL;DR – Passwords stored using reversible encryption,Β even if they are VERY LONG, Β can be trivially reversed by an attacker. Password cracking is quite enjoyable. It is very satisfying […]

The post How I Cracked a 128-bit Password appeared first on Black Hills Information Security, Inc..

  •  

Running HashCat on Ubuntu 18.04 Server with 1080TI

Derrick Rauch and Kent Ickler // (Updated 3/22/2019) First, to see what our build looks like, look here:Β https://www.blackhillsinfosec.com/build-password-cracker-nvidia-gtx-1080ti-gtx-1070/ What’s next?Β Time for System Rebuild! First, you need to decide whether you […]

The post Running HashCat on Ubuntu 18.04 Server with 1080TI appeared first on Black Hills Information Security, Inc..

  •  

Hashcat 4.10 Cheat Sheet v 1.2018.1

Kent Ickler // It seemed like we were always cross-referencing the Hashcat Wiki or help file when working with Hashcat. We needed things like specific flags, hash examples, or command […]

The post Hashcat 4.10 Cheat Sheet v 1.2018.1 appeared first on Black Hills Information Security, Inc..

  •  

How to Crack Office Passwords with a Dictionary

Kent Ickler// TLDR: We use a custom dictionary to crack Microsoft Office document encryption. Β Then we use a custom dictionary for pwnage in LinkedIn hash database. Background: I recently got […]

The post How to Crack Office Passwords with a Dictionary appeared first on Black Hills Information Security, Inc..

  •  

How to Crack Passwords for Password Protected MS Office Documents

Carrie Roberts*Β // (Updated, 2/11/2019) Trying to figure out the password for a password protected MS Office document? This free solution might do the trick. It attempts to guess the password […]

The post How to Crack Passwords for Password Protected MS Office Documents appeared first on Black Hills Information Security, Inc..

  •  

How to Crack Passwords in the Cloud with GPU Acceleration (Kali 2017)

Carrie Roberts* // How does password cracking in the cloud compare to down here on earth? Maybe not as heavenly as imagined. I saw this on the web and got […]

The post How to Crack Passwords in the Cloud with GPU Acceleration (Kali 2017) appeared first on Black Hills Information Security, Inc..

  •  

How to Build a Password Cracker with NVidia GTX 1080TI & GTX 1070

Kent Ickler // The Task Buy The Things: Total for new password cracking machine$5110 A Few Quick Lessons The CPU cooler doesn’t actually clear the case cover. This was OK […]

The post How to Build a Password Cracker with NVidia GTX 1080TI & GTX 1070 appeared first on Black Hills Information Security, Inc..

  •  
❌