Brute Force

/Tag:Brute Force

Week 32 In Review – 2016

Events Related DARPA's Cyber Grand Challenge: Early Highlights from the Competition - Early highlights from the world's first all-machine hacking tournament, DARPA's Cyber Grand Challenge (CGC). This computer security competition featured seven High Performance Computers as competitors. CGC took place on Thursday, August 4, 2016. Building the Workforce through Cybersecurity Competitions - The [...]

Week 7 In Review – 2016

Events Related BSidesNYC2016 - Resources mediatek mt6261 rom dumping via the vibration motor - McAfee SiteList.xml password decryption - Recently, a very good friend of mine pointed me out the story of a pentester who recovered the encrypted passwords from a McAfee SiteList.xml file, using Responder. Brute-forcing Microsoft Lync via NTLM - [...]

Week 45 In Review – 2015

Resources SecTor 2015 - Presentations and videos for SecTor 2015 RuxCon - Tools NMAP - NMAP scripts for TN3270 interaction as well as NJE. Most notably TSO User Enumeration and Brute Force. CICS transaction ID enumeration and NJE node name brute forcing. Techniques Hidden In Plain Sight: Brute Forcing Slack Private Files - [...]

Week 41 In Review – 2015

Events Related Conference Jumping right in with the keynote of Day 1 by Jon Callas and my favorite quote “Make your devices fixable”. Enough said. Conference Day 1 - Conference Day 2 - Applied Physical Attacks on x86 Systems - GrrCON 2015 Videos - Videos of the presentations from GrrCON 2015 Resources [...]