== gkourgkoutas.net ==
IGs personal blog

Windows Hashes

security windows hash
All the different types of Windows hashes can be confusing sometimes. So to clear thinks up a little bit, I wrote some Key points to help understand what most of the stuff like LM, NTLM and DCC is all about. An excellent writeup for NTLM relaying1 is from byt3bl33d3r. All the other sources2 3 4 can be found in the footnotes. Hash types LM Hashes5 Since OS/2 (ca. 1980) in use Limited character set - everything is an CAPS and a 7 char character-limit When hashing, the PW is padded to 14 characters with zeros and encrypted with DES Very easily crackable - found only in exceptions in NTDS. Read more...


security hacking windows
Definition: Kerberos Kerberos (/ˈkɜːrbərɒs/) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.1 There is also the MIT version of Kerberos, but it’s slightly different than the Microsoft2 implementation.3 Kerberos is also the three headed dog who guards the entrance to the underworld in greek mythology.4 Read more...

1mb Club

security web development
Making the web less bloated So recently I found a website called 1MB Club, where people’s websites are listed which are less than 1MB in size. I realy liked the idea of the website because I found likeminded people, who love to build sites, which don’t burden your bandwith. Make sure to check out bradleytaunt’s Github Page. Only people who lived through ISDN and/or a bandwith of 57KiB/s know what it feels like, when you have to download a file/program which is bigger than 25MB. Read more...


security hacking passwords
It’s rather bad than complex A lot of users1 always choose their passwords based on the same criteria: They use the same password for every service password reuse They use a combination of username + year of birth user95 The classic par excellence: season + year Winter2020 With common password lists, these kind of passwords can be found out in seconds. Even if they’re hashed, cracking them with tools like Hashcat2 in combination with rule based lists3 and potent hardware is not a big effort. Read more...


security hacking code development
And I’m not talking about the Corona one here. Definition A computer virus is a type of malicious software program (“malware”) that, when executed, replicates itself by modifying other computer programs and inserting its own code. Infected computer programs can include as well, data files, or the “boot” sector of the hard drive. When this replication succeeds, the affected areas are then said to be “infected” with a computer virus. Read more...
Previous Page 2 of 3 Next Page