Skip to content
logo infosecscout
  • Kali Linux – From Zero to Hero
  • ArticlesExpand
    • Security
    • Hacking
    • Kali Linux
  • Other Resources
logo infosecscout

Hacking

Getting Started With John The Ripper On Kali Linux
Hacking | Kali Linux

Getting Started With John The Ripper On Kali Linux

John The Ripper has been around for a while, and is definitely a tool all hackers and pentesters use all the time. But if you are a beginner in this field, using John The Ripper is not necessarily straightforward. Don’t worry, I’ll explain everything in this article to help you get started the right way….

Read More Getting Started With John The Ripper On Kali LinuxContinue

How To Use Mask Attack With Hashcat – A complete guide
Hacking

How To Use Mask Attack With Hashcat – A complete guide

Hashcat is a free and fast password cracker available on any platform (Linux, Windows, macOS). I talk a lot about this tool on this website, and today we’ll focus on one of the most popular feature you can use with Hashcat: the mask attack. Hashcat can use several attacks. Mask attacks is the number 3…

Read More How To Use Mask Attack With Hashcat – A complete guideContinue

How To Install Hashcat on Windows In 2023
Hacking

How To Install Hashcat on Windows In 2023

Hashcat is my favorite password cracker. You can use it on any operating system or distribution, but it’s often easier to use Windows to avoid drivers issues (especially with a recent GPU). Anyway, I will explain how to install it on Windows in this tutorial. Hashcat is officially supported on Windows, binaries files can be…

Read More How To Install Hashcat on Windows In 2023Continue

How To Install Hashcat On Ubuntu In 2023
Hacking

How To Install Hashcat On Ubuntu In 2023

Hashcat is an important tool to have in your tool belt (on your computer at least ^^). I already wrote several tutorials on how to use Hashcat, but today we’ll stay focus on the installation, especially on a Linux distribution like Ubuntu. The easiest way to install Hashcat on Ubuntu is to use the package…

Read More How To Install Hashcat On Ubuntu In 2023Continue

How do Hackers get Hashed Passwords?
Hacking

How do Hackers get Hashed Passwords?

It is a common thing to hear people complain of fraudsters hacking their accounts. One wonders how possible this is, since most people never reveal their passwords. For many, such acts lead to losing their funds, while others get locked out from their social media handles. But how do passwords get hacked in the first…

Read More How do Hackers get Hashed Passwords?Continue

What is a Rainbow Table? (MD5 Decryption Strategy)
Hacking

What is a Rainbow Table? (MD5 Decryption Strategy)

The MD5 algorithm is a one-way hash function, it’s not reversible, so there is no way to decrypt a MD5 hash “automatically”. However, current technologies allow us to use different strategies to crack MD5 hashes and find the original word. Using a rainbow table is one of them, and that’s what I’ll introduce in this…

Read More What is a Rainbow Table? (MD5 Decryption Strategy)Continue

Is MD5 Easy to Crack? (and how long does it really takes)
Hacking

Is MD5 Easy to Crack? (and how long does it really takes)

Many legends are discussed about the MD5 algorithm, but it’s time to break the myths and talk about real facts. Is the MD5 algorithm still safe to store passwords? That’s what we’ll see in this article. The MD5 algorithm is no longer considered safe to store passwords, as it’s coming more and more easy to…

Read More Is MD5 Easy to Crack? (and how long does it really takes)Continue

How to Decrypt MD5 in JavaScript? (Solution with examples)
Hacking

How to Decrypt MD5 in JavaScript? (Solution with examples)

Cracking MD5 hashes is interesting for many people, and if you are programming in JavaScript you are at the perfect place. In this article, you’ll learn how to use MD5 in JavaScript and also how to decrypt MD5 hashes. The MD5 hash function works in one way only, there is no reverse function, whatever the…

Read More How to Decrypt MD5 in JavaScript? (Solution with examples)Continue

How to Decrypt MD5 in Java?  (Real Solution with Code Sample)
Hacking

How to Decrypt MD5 in Java? (Real Solution with Code Sample)

Everybody wants a solution to decrypt MD5 hashs, and Java programmers are also interested 🙂In this article, you’ll learn how to do this, and also discover a few things about the MD5 algorithm. The MD5 cryptographic algorithm only works one way. It’s possible to crypt a word into MD5 with Java, but there is no…

Read More How to Decrypt MD5 in Java? (Real Solution with Code Sample)Continue

How to Install and Use Hashcat to Decrypt MD5? (Tutorial)
Hacking

How to Install and Use Hashcat to Decrypt MD5? (Tutorial)

Decrypting MD5 hashes is probably a goal for most of you on this website, and hashcat seems a pretty good tool to help you in this task.The problem is that it’s not the easier software to understand and use, whatever your operating system is.In this tutorial, I will explain everything and show you effective ways…

Read More How to Install and Use Hashcat to Decrypt MD5? (Tutorial)Continue

Page navigation

1 2 Next PageNext

Welcome

Hi, my name is Patrick, I'm a web developer and network administrator. I have always been interested in security, and I created this website to share my findings with you.

Time to level up!

Want to master Kali Linux like a pro?
I have a book and course available for you, that will guide you to install Kali Linux, configure it and discover the most useful tools included and how to use them the right way.

Learn more

Popular articles

  • How to use Wireshark on Kali Linux
  • How to open an MD5 file
  • Generate a MD5 checksum
  • How are passwords stored
  • MD5 vs SHA256

Latest articles

  • Mastering Netcat on Kali Linux: A beginner’s guide
  • Kali Linux Default Password: Default user, root & SSH tips
  • Getting Started with BeEF on Kali Linux: A Complete Guide
  • Python on Kali Linux: A beginner’s guide to get started
  • Kali Linux: How to Capture Screenshots Like a Pro
  • About Me
  • Privacy Policy
  • Terms and Conditions
  • Contact

© 2023 InfosecScout

Our website is supported by our users. We may earn a commission when you click through the affiliate links on our website.

  • Kali Linux – From Zero to Hero
  • Articles
    • Security
    • Hacking
    • Kali Linux
  • Other Resources
Search
x