Files
obsidian/SS23/English/KW18.md

22 lines
539 B
Markdown

- People get your password by
- Cracking a database
- try out passwords until a hash matches up
- try that password on other accounts
- Hashcat
- utilizes GPU
- 10 billion hashes per second per gpu
- 4 Titan X
- different hash algorithms
- MD5 (unsecure)
- SHA-512 (better)
- better hash takes longer
- password cracking strategies
- brute force
- seven lower case letters in 1 second
- characters ^ amount of characters
- dictonary attack
- common passwords
- normal words
- combinations
- small changes (at to @)