Category Archive: Hacking

Mar 02

Time to crack passwords

Below table represents estimated time to crack passwords based on passphrase lenght and complexity.   Of course time may differ depending on number of factors like: Using dictionary words in passwords may allow almost instant crack ( for example if “rainbow tables” are beign used) Hardwa used (CPU/GPU power, RAM etc.) Application used to crack …

Continue reading »

Aug 25

POODLE attack

poodle attack

A POODLE attack is an exploit that takes advantage of the way some browsers deal with encryption. POODLE (Padding Oracle On Downgraded Legacy Encryption) is the name of the vulnerability that enables the exploit. POODLE can be used to target browser-based communication that relies on the Secure Sockets Layer (SSL) 3.0 protocol for encryption and …

Continue reading »

Aug 20

Google hacks

Google hacking is nothing more than using built in ways to search or in fact query the search engine to provide specific output based on search criteria. Targeted search based on target type: INTITLE: INTEXT: INURL: FILETYPE: LINK: Funny bit: Type in Google phrase “do a barrel roll” or “zerg rush” and hit enter