The 4ARMED Blog
Insight, analysis and news from 4ARMED’s application
and cloud security specialists
In this tutorial we will show you how to perform a combinator attack using hashcat.
For demonstration purposes, we will be using the MD5 password hashes from the Battlefield Heroes leak in 2013. The password hashes can be obtained here.
The commands used in this tutorial were run using the Kali …
Read