Rainbow table

Results: 83



#Item
21Angling / Catch and release / Rainbow trout / Angling in Yellowstone National Park / Fly fishing / Fishing / Fish / Recreational fishing

Table of Contents What’s New for 2015...............................................................2 Seasons, Daily Limits and Size Limits....................................6 Licences and Fees....................

Add to Reading List

Source URL: www.gov.pe.ca

Language: English - Date: 2015-03-25 13:10:21
22Cyberwarfare / NTLM / LM hash / Kerberos / Pass the hash / Integrated Windows Authentication / Ticket Granting Ticket / Password / Rainbow table / Computer security / Cryptography / Computer network security

A single NT hash can be used to access almost any data which resides in a Windows domain environment. The theory behind the first practical “Pass the Hash” attack against Microsoft Windows NT and the Lan Manager (LM)

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-07-22 18:04:53
23Cryptographic software / Password / Rainbow table / Crypt / Salt / Key derivation function / Bcrypt / Password cracking / Security Accounts Manager / Cryptography / Computer security / Security

Enterprise Recipes with Ruby and Rails

Add to Reading List

Source URL: media.pragprog.com

Language: English - Date: 2009-06-01 18:00:49
24Cryptographic hash functions / Mathematics / Information retrieval / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2013-12-11 18:35:17
25Cryptographic software / Computer law / Password cracking / Password / Rainbow table / Salt / Key stretching / Crypt / Bcrypt / Cryptography / Cryptographic hash functions / Key management

Password Hashing Competition - Survey and Benchmark George Hatzivasilis1 , Ioannis Papaefstathiou1 , and Charalampos Manifavas2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-22 05:43:55
26Artificial intelligence / Information retrieval / Bloom filter / Hash function / Cryptographic hash functions / Hash table / Password / Rainbow table / Password strength / Search algorithms / Hashing / Cryptography

An Algorithm for Approximate Membership Checking With Application to Password Security Udi Manber1 and Sun Wu Department of Computer Science University of Arizona

Add to Reading List

Source URL: webglimpse.net

Language: English - Date: 2002-10-23 23:03:02
27Cryptographic software / Cryptographic hash functions / Key management / Password / Keychain / Salt / KeePass / Rainbow table / PBKDF2 / Cryptography / Software / Computer security

Programming Assignment 1 Winter 2015 CS 255: Intro to Cryptography Due Feb. 13, 11:59pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-02 11:42:01
28Precomputation / Trade-off / Mathematics / Computing / Logic / Software optimization / Rainbow table / Algorithm

Cryptology ePrint Archive: Report[removed]This is the full version of the article presented at ACISP 2013 under the same title. LNCS 7959, pp.347–362. DOI: [removed][removed]3_24 Analysis of the Non-Perfect Tab

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-15 01:44:22
29Cryptographic hash functions / Salt / Rainbow table / Password cracking / Password / Dictionary attack / NTLM / Crack / MD5 / Cryptography / Computer security / Cyberwarfare

Enough with the Insanity Dictionary Based Rainbow Tables Matt Weir Florida State University Shmoocon 2009

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:40
30Software / NTLM / Pass the hash / Pwdump / Rainbow table / Password / Samba / Integrated Windows Authentication / Security Accounts Manager / Computer security / Computer network security / Cyberwarfare

Post-Exploitation with WCE v1.2 Pass-the-Hash. Pass-the-ticket & more… Date: 01-07-2011 Author: Hernan Ochoa

Add to Reading List

Source URL: www.ampliasecurity.com

Language: English - Date: 2015-01-12 10:16:16
UPDATE