«
Expand/Collapse
87 items tagged "john"
Related tags:
arduino [+],
tar gz [+],
john mcafee [+],
mcafee [+],
led [+],
hackaday [+],
digital [+],
tar [+],
john the ripper [+],
classic [+],
unix passwords [+],
unix [+],
password cracker [+],
password [+],
ripper [+],
hacks [+],
flavors [+],
yersinia [+],
video [+],
system [+],
surveillance [+],
stock [+],
puck [+],
privacy [+],
perry barlow [+],
neighbor [+],
misc [+],
microcontrollers [+],
matrix [+],
linux distribution [+],
linux [+],
links [+],
kinect [+],
john perry barlow [+],
iso [+],
gnu linux [+],
gnu [+],
game [+],
eye [+],
display [+],
cuda [+],
credit card frauds [+],
credit [+],
coco [+],
christmas [+],
chaos communication camp [+],
cameras [+],
blogs [+],
belize [+],
audio [+],
alpha [+],
aircrack [+],
Wireless [+],
Software [+],
Newbie [+],
Area [+],
zzstructure [+],
zelda music [+],
zelda [+],
youtube [+],
world physics [+],
wordlists [+],
wordlist [+],
word list [+],
wiring practices [+],
wii [+],
webcam [+],
wearable [+],
watt uv [+],
watt [+],
vmware [+],
vintage camera [+],
vintage [+],
video camera [+],
uv leds [+],
usb joystick [+],
underwater microphone [+],
trs [+],
tracking software [+],
touchscreen [+],
touchit [+],
tool [+],
tin foil [+],
time on his hands [+],
thrift store [+],
thrift [+],
tft lcd panel [+],
tft [+],
tandy color computer [+],
surprise [+],
stock ticker [+],
stage lighting [+],
speeders [+],
speed [+],
sole purpose [+],
solder paste [+],
solder [+],
solar communications [+],
software pioneer [+],
software engineer [+],
simple [+],
serial devices [+],
serial [+],
security system [+],
security [+],
scrolling [+],
script [+],
schematics [+],
salve [+],
rule [+],
rsmangler [+],
robotic [+],
ring [+],
riney [+],
rfid [+],
relic [+],
record [+],
real world [+],
read [+],
r c tank [+],
python script [+],
python [+],
pyrit [+],
pupil [+],
project [+],
program [+],
printer [+],
post [+],
pong game [+],
planet [+],
pioneer [+],
pin headers [+],
pin header [+],
pin [+],
piezo elements [+],
philadelphia theater [+],
peripherals [+],
pcboard [+],
paste [+],
passthrough [+],
paper [+],
optical mouse [+],
opencv [+],
omaha [+],
old tyme [+],
odometry [+],
nvidia 9800gtx [+],
nunchuk [+],
nostalgia [+],
noob [+],
nifty solution [+],
new digital camera [+],
neighborhood [+],
mustache [+],
music synthesizer [+],
mouse [+],
motorcycle helmet visors [+],
motorcycle [+],
monotron [+],
monochrome lcds [+],
mode [+],
mod [+],
mini fridge [+],
midi signals [+],
mechanical [+],
marquee [+],
mardi gras mask [+],
manhunt [+],
manhattan skyscraper [+],
manhattan [+],
mangling [+],
macs [+],
mac plus [+],
luminary [+],
lighting project [+],
lifespan [+],
led matrix [+],
leave [+],
lcd [+],
lasers [+],
land speed record [+],
lamp [+],
label [+],
kitchen island [+],
kitchen [+],
keyboard [+],
kawasaki kz400 [+],
kawasaki [+],
junk [+],
joystick [+],
john scancella [+],
john ripper [+],
john riney [+],
john ohno [+],
john creswell [+],
island [+],
internet [+],
internal eeprom [+],
interactivity [+],
input devices [+],
input [+],
incremental mode [+],
image manipulation [+],
image [+],
hypertext [+],
html url [+],
hot glue [+],
hostos [+],
home [+],
helmits [+],
hand [+],
halloween costume [+],
hacking [+],
groundhog [+],
green [+],
good job [+],
glue [+],
globe [+],
gle [+],
gia [+],
garry [+],
fun toys [+],
fun [+],
fuel class [+],
frank [+],
file password [+],
file [+],
fabulously [+],
eye tracking [+],
envy [+],
engagement ring box [+],
engagement [+],
emulator [+],
electronics projects [+],
eeprom [+],
dual row [+],
don [+],
dmx [+],
dispenser [+],
disco planet [+],
disco [+],
dirty fingers [+],
dip [+],
digital rgb [+],
destroying [+],
design [+],
demystifying [+],
darknet [+],
d pong [+],
crt [+],
creating [+],
contests [+],
contest [+],
colorful animation [+],
color computer [+],
color [+],
christmas morn [+],
christmas lights [+],
chord [+],
catch [+],
casual enthusiast [+],
caratteri [+],
cans [+],
camera [+],
camcorder [+],
cabinet [+],
breadboard [+],
box [+],
bot [+],
bluetooth [+],
bloom county comic strip [+],
bloom county [+],
betsy [+],
banana [+],
avnet [+],
authorities [+],
atari jaguar [+],
android [+],
access system [+],
Tools [+],
Supporto [+],
Pentesting [+],
Angolo [+],
4d systems [+]
-
-
5:00
»
Hack a Day
Needing a Christmas present for his 4- and 5-year-old nieces, [John] built a one-dimensional PONG game, sure to be the delight of rosy-cheeked children on a Christmas morn. The new and improved 1D PONG game is built around a digital RGB LED strip with an LPD8806 LED controller. The speed of the ‘ball’ is controlled by a [...]
-
-
12:01
»
Hack a Day
Not knowing what’s going on inside of your electronics projects can make it quite difficult to get the bugs out. [John] was bumping up against this problem when working on wireless communications between several devices. At just about the same time his friend came up with a script with lets you monitor multiple serial devices in one [...]
-
13:13
»
Hack a Day
Every smartphone (and most dumb phones) has a video camera built into it these days. Some of them are even capable of recording respectable HD video. So we’d bet that the decades old camcorder you’ve got kicking around isn’t getting any use at all anymore. [John] wants to encourage you to hack that hardware. He [...]
-
-
15:01
»
Hack a Day
[John] wrote in with a solution to a prototyping issue that has vexed us for quite some time. Above you can see the DIP friendly solution for dual-row pin headers which he came up with. With just a bit of easy soldering he now has a breadboard friendly device for prototyping. He starts by soldering [...]
-
-
4:00
»
Hack a Day
We’ve seen a couple of UV lamp builds for exposing photosensitive PCBs and erasing EPROMs, but [John] over at pcboard.ca decided if it’s worth doing, it’s worth overdoing. They designed a UV exposure board using twelve 1 Watt UV LEDs, an impressive amount ultraviolet light that you probably shouldn’t look at for too long. We’ve [...]
-
-
14:00
»
Hack a Day
[John] from MIT is working on a project to bring a little bit of interactivity to the hacks he does. Because his hacks receive much more attention on the Internet than in real life, [John] made it so clicking a button in your browser can change something in the real world. He calls his creation [...]
-
-
12:01
»
Hack a Day
Congratulations to [John Scancella] and his wife to be. Their recent engagement was aided by one of [John's] projects. Since [Betsy] is a big fan of Zelda, he thought it would be fun to present the ring with the Zelda music playing in the background. He and a friend combined forces to build what you [...]
-
-
23:17
»
Packet Storm Security Recent Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
23:17
»
Packet Storm Security Misc. Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
-
10:01
»
Hack a Day
One of the problems future engineers spend a lot of class time solving is the issue of odometry for robots. It’s actually kind of hard to tell how far a robot has traveled after applying power to its wheels, but [John] has a pretty nifty solution to this problem. He converted an optical mouse into [...]
-
-
5:01
»
Hack a Day
About half a year ago [John] over at Frank’s Kitchens came to me with an idea for a giant lighting project. He had this 6ft diameter aluminum frame globe rescued from the Philadelphia Theater Company and wanted it to be an interactive display of sorts. After a few discussions we got together and somehow managed [...]
-
-
21:45
»
SecDocs
Authors:
Sandro Gaycken Tags:
privacy Event:
Chaos Communication Camp 2007 Abstract: One thing often lacking in discussions around privacy is a clear argument apart from the intuitive “I don’t like to be under surveillance”. This absence fatally leads to the wrong public impression that it is only about a personal taste for privacy against hits on child molesters, credit card fraud and terrorism. My talk thus will give some clear and rock-solid arguments, demonstrating privacy as a protection from injustice and from a new and speculative class society, as the foundation of our abilities to judge independently and ethically, as the breeding ground for personal and societal development, as our impression of freedom and as an important pre-emptive value to prohibit technological infrastructures for dictatorships. One thing often found to be lacking in many discussions on the struggle for privacy is a clear argument in favour of it. Even most activists whom everyone would suppose to have clear reasons mostly argue in strongly subjective terms, stating their personal uneasiness or discomfort with some surveillance problem in terms as “I don’t like to be under surveillance”. And sure enough: who does? But in times where terrorists disguise as civilians, where child molesters and credit card frauds use synonyms and all sorts of electronic communication, also disguised as harmless people, and where surveillance is ubiquitous in the sense that it is disseminated entirely invisible and unpresent – why not feel different? On what grounds can we really charge someone who says: “If surveillance doesn’t really disturb me and if it helps to catch terrorists and child molesters and protect my credit card, I think it’s ok”. In fact, even John Perry Barlow (on the last congress) seemed to be in favour of some sort of intern, panoptical self-surveillance if it does protect his credit card from fraud and his email account from spam. So why bother? Are we only protecting our very own (and probably misplaced) feelings? Of course not. By fighting for privacy, we fight for a most basic, most human need: our space. We need our space and we need it for a whole variety of important reasons: psychological, ethical, political, societal and others. And many scholars have in fact explored and argued in depth for these reasons. They only have to be translated and be made accessible. In my talk, I will thus present these scholarly perspectives in an understandable manner and thus will support the privacy activist with two whole fistfuls of most reasonable and valuable arguments in favour of privacy and in strong opposition to any kind of surveillance. By this, I deeply hope to fill that argumentative gap and clarify the activists intuitions.
-
-
21:39
»
SecDocs
Authors:
Sandro Gaycken Tags:
privacy Event:
Chaos Communication Camp 2007 Abstract: One thing often lacking in discussions around privacy is a clear argument apart from the intuitive “I don’t like to be under surveillance”. This absence fatally leads to the wrong public impression that it is only about a personal taste for privacy against hits on child molesters, credit card fraud and terrorism. My talk thus will give some clear and rock-solid arguments, demonstrating privacy as a protection from injustice and from a new and speculative class society, as the foundation of our abilities to judge independently and ethically, as the breeding ground for personal and societal development, as our impression of freedom and as an important pre-emptive value to prohibit technological infrastructures for dictatorships. One thing often found to be lacking in many discussions on the struggle for privacy is a clear argument in favour of it. Even most activists whom everyone would suppose to have clear reasons mostly argue in strongly subjective terms, stating their personal uneasiness or discomfort with some surveillance problem in terms as “I don’t like to be under surveillance”. And sure enough: who does? But in times where terrorists disguise as civilians, where child molesters and credit card frauds use synonyms and all sorts of electronic communication, also disguised as harmless people, and where surveillance is ubiquitous in the sense that it is disseminated entirely invisible and unpresent – why not feel different? On what grounds can we really charge someone who says: “If surveillance doesn’t really disturb me and if it helps to catch terrorists and child molesters and protect my credit card, I think it’s ok”. In fact, even John Perry Barlow (on the last congress) seemed to be in favour of some sort of intern, panoptical self-surveillance if it does protect his credit card from fraud and his email account from spam. So why bother? Are we only protecting our very own (and probably misplaced) feelings? Of course not. By fighting for privacy, we fight for a most basic, most human need: our space. We need our space and we need it for a whole variety of important reasons: psychological, ethical, political, societal and others. And many scholars have in fact explored and argued in depth for these reasons. They only have to be translated and be made accessible. In my talk, I will thus present these scholarly perspectives in an understandable manner and thus will support the privacy activist with two whole fistfuls of most reasonable and valuable arguments in favour of privacy and in strong opposition to any kind of surveillance. By this, I deeply hope to fill that argumentative gap and clarify the activists intuitions.
-
-
8:01
»
Hack a Day
As a relic of the early 80s, the TRS-80 Color Computer couldn’t display very many colors. By default, the CoCo could only display 8 colors on the screen at a time, but [John] figured out a way to increase the number of colors displayed using a very simple trick that surprisingly isn’t found in original CoCo [...]
-
-
16:53
»
Packet Storm Security Recent Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
16:53
»
Packet Storm Security Tools
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
16:53
»
Packet Storm Security Misc. Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
-
16:01
»
Hack a Day
[John] is keeping the neighborhood safe by keeping an eye out for speeders. Well, he’s really keeping a webcam out for speeders. His technique doesn’t use radar or lasers. He’s processing webcam frames in Python to calculate speed. It comes down to some basic image manipulation. He firsts gathers the images necessary to make the [...]
-
-
9:03
»
Hack a Day
[John] has been working on a video-based eye tracking solution using OpenCV, and we’re loving the progress. [John]‘s pupil tracking software can tell anyone exactly where you’re looking and allows for free head movement. The basic idea behind this build is simple; when looking straight ahead a pupil is perfectly circular. When an eye looks [...]
-
-
6:01
»
Hack a Day
Don’t get your dirty fingers on the glass [Poke] sent in a video of him using Android devices with a wiimote and PS3 controller. The build uses the Joystick2Touch and the USB Joystick Center app. Root is required, but this will be very useful when tv-sized Android devices start showing up. Wonderful restoration work [John] sent in [...]
-
-
5:36
»
Hack a Day
Wii Nunchuk controlled Monotron Adding a bit of motion control to your music synthesizer turns out to be pretty easy. Here’s an example of a Wii Nunchuk used to control a Monotron. [Thanks John] Hackers on the Moon and other space related goals Yep apparently a non-government backed expedition to the moon is in the [...]
-
-
11:00
»
Hack a Day
Retro is in the air today as [John] has tipped us off about a new game he has written for the Tandy Color Computer (CoCo), The game, inspired by the homebrew game DOWNFALL for the Atari Jaguar, features what looks like snappy game play, lots of bright colorful animation and has just entered the Alpha [...]
-
-
18:25
»
Packet Storm Security Recent Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
18:25
»
Packet Storm Security Tools
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
18:25
»
Packet Storm Security Misc. Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
-
10:09
»
Packet Storm Security Recent Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
10:09
»
Packet Storm Security Tools
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
10:09
»
Packet Storm Security Misc. Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
-
18:42
»
Packet Storm Security Misc. Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
-
12:01
»
Hack a Day
[John] likes making things out of unusual junk, and decided to build something for the sole purpose of trolling others. He thought it would be funny to stuff a new digital camera into the body of an old, obsolete camera, just to see how people would react to it. He considered several different cameras, including [...]
-
-
6:00
»
Hack a Day
Sometimes you don’t need a lot of horsepower to win a speed record. In a fluke of no one else competing in the alt fuel class, [John]‘s biodiesel motorcycle set a new land speed record at the LTA event last summer. [John]‘s bike is a junkyard 1978 Kawasaki KZ400. The stock engine was replaced with a [...]
-
-
14:14
»
Hack a Day
[John] has always loved stock ticker machines. These machines are highly collectible, so short of finding one that wasn’t hurled from a Manhattan skyscraper in 1929, a stock ticker is out of reach for the casual enthusiast. There is another way to get a stock ticker-like device though: hack a label printer to print out [...]
-
-
22:56
»
Packet Storm Security Recent Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
22:56
»
Packet Storm Security Misc. Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
-
7:03
»
Hack a Day
[John] wrote in to tell us about this contest hosted by Avnet. All one has to do is upload a video of their design to Avnet’s Youtube page. There are four categories to choose from including: Solar, Communications, Transportation, and Entertainment. Four contestants can win an iPad2. The only catch, if you can call it [...]
-
-
17:04
»
Packet Storm Security Recent Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
17:04
»
Packet Storm Security Misc. Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
-
8:32
»
Packet Storm Security Recent Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
8:32
»
Packet Storm Security Misc. Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
-
9:01
»
Hack a Day
[John Ohno] has been working on a zzstructure operating system written C since January. [John] realizes not many people know what a zzstructure is, so he posted a demo of his project. [John] has also put all the code online. A zzstructure is both a hypertext and operating system unlike anything we have today. You [...]
-
-
14:01
»
Hack a Day
[John] got a shiny new solder paste dispenser for a steal, and before he hooked up the tool, he decided to take a look inside to make sure everything was on the up and up. Aside from a few questionable wiring practices he didn’t approve of, everything else looked to be in good working order. [...]
-
-
2:05
»
Packet Storm Security Recent Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
2:05
»
Packet Storm Security Misc. Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
-
8:46
»
Packet Storm Security Recent Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version.
-
8:46
»
Packet Storm Security Misc. Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version.
-
-
13:22
»
Packet Storm Security Recent Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version.
-
13:22
»
Packet Storm Security Misc. Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version.
-
-
4:05
»
Hack a Day
We’ve seen projects test the lifespan of an EEPROM before, but these projects have only tested discrete EEPROM chips. [John] at tronixstuff had a different idea and set out to test the internal EEPROM of an ATmega328. [John]‘s build is just an Arduino and LCD shield that writes the number 170 to memory on one [...]
-
-
7:11
»
Hack a Day
Here is a post from [John's Projects]. For the insane, satirical, and incredible 2011 Omaha Groundhog Prom [John] and his buddy fabricated helmets reminiscent of our favorite robot rockers. [John] needed something harder, better, faster, stronger than the competition and wound up creating LED matrices that mount behind aerodynamic motorcycle helmet visors. The helmets were [...]
-
-
20:51
»
Packet Storm Security Recent Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version.
-
20:51
»
Packet Storm Security Misc. Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version.
-
-
12:01
»
Hack a Day
[John] wrote in to share his latest creation, an Arduino-controlled Bluetooth robot. You might remember him from one of his previous hacks, the Lawnbot 400. This time around, he has decided to scale things down a bit and focus his hacking on small R/C toys. His Bluetooth bot was constructed using a cheap R/C tank [...]
-
-
13:20
»
Hack a Day
[John B] is a software engineer and had some spare time on his hands, so he started messing around with his Kinect which had been sitting unused for awhile. He wanted to see what he could create if he was able to get Kinect data into a virtual environment that supported real-world physics. The first [...]
-
-
12:02
»
Hack a Day
Seven-segment displays and monochrome LCDs are fine for most projects, but some things simply look better in color. [John] over at the Little Bird Electronics blog recently wrote up a tutorial demonstrating the use of a TFT LCD panel with an Arduino. The specific panel he chose was a 4D Systems 1.44” TFT LCD that [...]
-
-
11:22
»
Packet Storm Security Recent Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version.
-
11:22
»
Packet Storm Security Misc. Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version.
-
-
20:49
»
Packet Storm Security Recent Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version.
-
20:49
»
Packet Storm Security Misc. Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version.
-
4:13
»
Hack a Day
A few months back, [John] was reading an article about a simple RFID security system kit, and decided he would like to build one himself. While many of the system’s details, including full schematics were provided, he was dismayed to find that the source code for the project was not published as it was held [...]
-
-
13:03
»
Hack a Day
[John Riney] picked up three strands of addressable Christmas lights and used them to make a scrolling marquee. You may remember that the G-35 lights were hacked at the beginning of December, and we saw a project or two that involved these fun toys. In order to make the display [John] modified the original packing [...]
-
-
5:00
»
Hack a Day
[John Creswell] built a heck of an automatic bartender in a kitchen island. The image on the left shows a top-down view of the inside of the cabinet. There’s a mini-fridge where the liquids are stored, and around the perimeter of the cabinet [John] mounted sixteen pumps to get the beverage up into your cup. Drinks are [...]
-
-
11:12
»
Hack a Day
While this mechanical mustache isn’t made for a Halloween costume, it certainly looks like part of one. Copper clad, brass, cable, and a few other bits come together in a similar style to tension based hands; the piece is then worn much like a Mardi Gras mask. To complete the rustic “old tyme” look [John] [...]
-
-
16:00
»
Hack a Day
[John's] latest build strikes a chord of nostalgia by realizing the Banana Jr. 6000. The whimsical hardware is the product of the Bloom County comic strip. It first appeared in 1984, the same year as the Macintosh. [John] used a Mac Plus as the case but completely revamped the insides. An 8″ touchscreen takes the [...]
-
-
14:02
»
Packet Storm Security Misc. Files
Puck is a GNU/Linux distribution based on TinyCoreLinux. It contains top penetration testing tools like Wireshark, Nmap, NetCat, John the ripper, Yersinia, THC-Hydra, etc while still remaining tiny in size.
-
14:01
»
Packet Storm Security Recent Files
Puck is a GNU/Linux distribution based on TinyCoreLinux. It contains top penetration testing tools like Wireshark, Nmap, NetCat, John the ripper, Yersinia, THC-Hydra, etc while still remaining tiny in size.
-
-
20:01
»
Packet Storm Security Tools
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
20:00
»
Packet Storm Security Recent Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
-
-
9:00
»
Hack a Day
This keyboard display has an RGB LED for each key that is addressable through the common stage lighting protocol, DMX. The project video, seen after the break, does a good job of walking us through the concept. By using a MIDI to DMX converter box [John] can show MIDI signals coming from a keyboard on [...]
-
-
18:21
»
remote-exploit & backtrack
I have an ASUS P6T7 WS SuperComputer motherboard with 4 nvidia 9800GTx+ cards in it and I installed the aircrack-cuda program I learned about on these forums **.
I can rip through passwords using John The Ripper at about 200,000K/s but the program misses the password of a known .cap file that I have.
When I run aircrack-ng (normal) using a word list of all English words I can crack the capture easily, but when running the CUDA enabled version I get to the end of the list without ever finding the password.
Is this a Known issue or did I do something wrong?
I googled the problem but I always end up back at these forums with no answer.
I am new to forums in general so please be gentile if I did it wrong and just made an ass out of myself.
**howtos/23208-aircrack-ng-cuda-wpa-2-psk-hacking-backtrack-4beta.html][/url]
-
-
18:01
»
remote-exploit & backtrack
Hey everyone,
I'm a bit new to the use of John the Ripper so please bear with me.
Currently I'm working with wordlist mangling for a class. What I need now is a rule that allows for only some of a single character to be switched.
For example, if I'm using a simple switch rule like this:
so[o0]
it would give me: google, g00gle, etc.
But I need it to also be able to give go0gle, g0ogle, etc.
Is there any rules that can help perform this? Thanks in advance. :)
-
-
0:59
»
remote-exploit & backtrack
Hello.
Probably it makes more sense for most users to have the BT4 VMWare Image
(bt4-final-vm.zip) run under VMWare with Windows as HostOS...
Are there any known problems if the HostOS is Linux/Debian?
Thank's a lot for any feedback!
John
-
-
9:29
»
Hack a Day
Here’s two input devices you can easily build with materials you already have on hand.
To the left, [John] built a 3×3 keypad matrix from paper and tinfoil. The rows and columns are made up of strips of tin foil on the front and back layers of paper. The layers are separated by spongy double-stick tape. [...]
-
1:06
»
remote-exploit & backtrack
Hey guys, I just want to say thank you for all the valuable information on here. I have learned a lot by just reading. I wanted to wait until I had a really good question to make my first post. I really hope this hasn't been answered already. If it has, I'm sorry. Must have missed it. I've been googling for hours trying to find a specific answer but I can't find it. Here goes...is it possible (using CUDA) to use John-the-ripper to generate passwords, have Pyrit compute the hash's and pipe directly to cowpatty to crack? If it is possible, what would be the command for that? I consider myself somewhat of a noob, so please don't assume I know something ;) Thank you!
-
-
12:00
»
Packet Storm Security Tools
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well.
-
-
12:00
»
Hack a Day
Buy stock in hot glue, this project corners the market on the stuff. [Leafcutter John] uses the hot goop as his water-proofer of choice when building an underwater microphone (also known as a hydrophone). By installing a couple of piezo elements on one lid of a tin can he is able to record some amazingly [...]
-
-
4:25
»
remote-exploit & backtrack
Salve a tutti,
vorrei testare una wpa di alice a 24 caratteri sfruttando john the ripper nel " incremental mode" andando a creare nel file john.conf un mode incremental con i caratteri a me necessari.Ho gia visto nel forum di aircrack che e' necessario configuare un file di collelagamento con estensione .char esempio :
[Incremental:Alpha]
File = $JOHN/alpha.chr
MinLen = 1
MaxLen = 8
CharCount = 26
qui con questa configurazione john crea caratteri presi dal file alpha.char con lung. max di 8 e min di 1
Il mio problema e' che modificando il parametro maxlen con un valore maggiore di 8 john va in errore e non riesco neanche ad aprire il file alpha.chr.Sempre sul forum di aircrack dice anche di dover modificare il file john.pot ma non dice come.Sicuro del vostro aiuto vi ringrazio anticipatamente.
-
-
14:29
»
remote-exploit & backtrack
salve a tutti,
ho un piccolo problema con john.ho cercato di cracckare la mia password di sistema ,ma quand do' il file etc/passwd gia shawdato a john la risposta da terminale e' :
NO PASSWORD HASHED LOADED.
come mai?
Ripeto che ho gia' effettuato lo unshadow del file password .
grazie per il vostro aiuto
-
-
10:03
»
Packet Storm Security Tools
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well.
-
10:03
»
Packet Storm Security Recent Files
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well.