The 4ARMED Blog

Insight, analysis and news from 4ARMED’s application
and cloud security specialists

hashcat

MD5

hashes

rule-based-attack

How To Perform A Rule-Based Attack Using Hashcat

12 September 2016

In this article, we will demonstrate how to perform a rule-based attack with hashcat to crack password hashes. For this tutorial, we are going to use the password hashes from the Battlefield Heroes leak in 2013. These passwords are MD5 hashed and can be downloaded here. This guide is demonstrated …
Read

detection

breach

4ARMED Sponsors ISC2 Tech Parents Workshop

8 September 2016

penetration-testing

preparation

The Commoditisation of Penetration Testing

5 September 2016

heartbleed

tls

Doing your own SSL/TLS testing

5 September 2016

phishing

social-engineering

Don’t get caught - Spot the phish!

2 September 2016

penetration-testing

vulnerability-assessment

Security Assessment Guide

9 August 2016