The 4ARMED Blog

Insight, analysis and news from 4ARMED’s application
and cloud security specialists

passwords

hashcat

MD5

hashes

How To Perform a Combinator Attack Using Hashcat

19 September 2016

In this tutorial we will show you how to perform a combinator attack using hashcat. For demonstration purposes, we will be using the MD5 password hashes from the Battlefield Heroes leak in 2013. The password hashes can be obtained here. The commands used in this tutorial were run using the Kali …
Read

detection

breach

4ARMED Sponsors ISC2 Tech Parents Workshop

8 September 2016

penetration-testing

preparation

The Commoditisation of Penetration Testing

5 September 2016

heartbleed

tls

Doing your own SSL/TLS testing

5 September 2016

phishing

social-engineering

Don’t get caught - Spot the phish!

2 September 2016