hashes
Good Essay on the History of Bad Password Policies
Stuart Schechter makes some good points on the history of bad password policies: Morris and Thompson’s work brought much-needed data to highlight a problem that lots of people suspected was bad, but ...

China Cracks Apple Private Protocol — AirDrop Pwned
AirDrop hashing is weaksauce: Chinese citizens using peer-to-peer wireless comms “must be identified.” ...

Extracting Kerberos Credentials from PCAP
NetworkMiner is one of the best tools around for extracting credentials, such as usernames and passwords, from PCAP files. The credential extraction feature is primarily designed for defenders, in order to analyze ...

Hash Hunting: Why File Hashes are Still Important
According to Gartner, threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable intelligence. When security research teams or government agencies release threat intelligence reports, some of the more tactical ...