Chick3nman 🐔
@chick3nman512
Sam Croley, Austin based password cracker & researcher; Team @hashcat Core Dev; CEO of Detack Inc. - @DetackGmbH; DMs always open
ID: 25700049
https://www.linkedin.com/in/chick3nman/ 21-03-2009 17:26:19
3,3K Tweet
3,3K Takipçi
1,1K Takip Edilen
Not sure what the expected service life is for a Yubikey, but my oldest(>10yrs of hard use) is still going strong despite lacking a little luster. I guess this is what Yubico | #YubiKey means when they say “strong multi-factor”. 🔐
“the password will be hashed via SHA-512 before being passed to bcrypt” Bun makes the classic mistake of prehashing before applying bcrypt instead of enforcing an input length limit. This is not only less safe, it’s specifically called out here cheatsheetseries.owasp.org/cheatsheets/Pa…
Team Hashcat took first place in the Jabbercracky contest at #DEFCON33! Thanks to HashMob for putting up a great fight and congrats on 2nd place! We're looking forward to your write-up! Huge thanks to Jabbercracky, Will Hunt @[email protected], and Password Village for organizing!