Definition: Kerberos Kerberos (/ˈkɜːrbərɒs/) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.1
There is also the MIT version of Kerberos, but it’s slightly different than the Microsoft2 implementation.3
Kerberos is also the three headed dog who guards the entrance to the underworld in greek mythology.4
Making the web less bloated So recently I found a website called 1MB Club, where people’s websites are listed which are less than 1MB in size. I realy liked the idea of the website because I found likeminded people, who love to build sites, which don’t burden your bandwith. Make sure to check out bradleytaunt’s Github Page.
Only people who lived through ISDN and/or a bandwith of 57KiB/s know what it feels like, when you have to download a file/program which is bigger than 25MB.
It’s rather bad than complex A lot of users1 always choose their passwords based on the same criteria:
They use the same password for every service
They use a combination of username + year of birth
The classic par excellence: season + year
With common password lists, these kind of passwords can be found out in seconds. Even if they’re hashed, cracking them with tools like Hashcat2 in combination with rule based lists3 and potent hardware is not a big effort.
And I’m not talking about the Corona one here.
Definition A computer virus is a type of malicious software program (“malware”) that, when executed, replicates itself by modifying other computer programs and inserting its own code. Infected computer programs can include as well, data files, or the “boot” sector of the hard drive. When this replication succeeds, the affected areas are then said to be “infected” with a computer virus.
Footprinting Footprinting; often simply called recon (short for reconnaissance) is the uninteresting part for some people when it comes to attacking systems. Many want to start exploiting as soon as possible, if not looting or post exploitation. Well those parts are certainly the best if a target is compromised… BUT: The pre-attack phase is crucial for a successful attack.
What is essential for good reconing? Much patience and above all thorough work!