Avatar feed
Responses: 2
Cpl Benjamin Long
1
1
0
pffft hack proof, right... If it was hack proof you wouldn't be announcing it was hack proof now would you...
(1)
Comment
(0)
Cpl Benjamin Long
Cpl Benjamin Long
7 y
and if they use SHA-256 encoding you can crack it with a bitcoin mining rig like it is a normal bitcoin transaction since the rig is an ASIC processor designed specifically to decrypt SHA256
(0)
Reply
(0)
Sgt Wayne Wood
Sgt Wayne Wood
7 y
Bullshit... cite a source
(0)
Reply
(0)
Cpl Benjamin Long
Cpl Benjamin Long
7 y
Also, normal cracking operation is the hash is captured by the recon team... they set up their analyzers like Airomon-ng with Airodump-ng which are tools that black hats and white hats use, if they are penetrating a Wifi. If they are cracking user log then they will set up wireshark with a MITM(Arp poisoning) scenario to eavesdrop on network traffic.

Once their net analysis captures a password hash, they will transfer it to the cracking team, who will run it through pyrit at a fixed installation with massive server capability to crack the password using a bruteforce.

Once the password is cracked they will log onto info systems and dump all data and then will use it in a manner consistent with their mission statement
(0)
Reply
(0)
Avatar small
PFC Mobile Gun System (Mgs) Gunner
1
1
0
I know the attitude of hackers everywhere challenge accepted LOL
(1)
Comment
(0)
MSgt Danny Hope
MSgt Danny Hope
7 y
That's going to be one tough cookie
(1)
Reply
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close