-
Follow me on Twitter
My TweetsBlogs I follow...
Archives
- June 2018 (1)
- January 2018 (1)
- June 2017 (2)
- September 2016 (1)
- October 2014 (1)
- September 2014 (3)
Categories
Author Archives: Stealthsploit
New Beginnings!
Just a quick update to say that I’ve moved on from my previous position and am excited to have co-founded a new company with a very good friend of mine @rebootuser ! Our new company is in.security and we’ll be … Continue reading
Posted in Pentest
Leave a comment
Ethereum Wallet Cracking Pt. 2 – GPU vs CPU
People have been asking why their system crashes when cracking some Eth wallets. This will explain why… Continue reading
Posted in crypto, password cracking, Pentest
19 Comments
Ethereum Wallet Cracking
A quick guide to breaking down the Ethereum JSON keystore file and prepping it for hashcat. Continue reading
Posted in password cracking, Pentest
60 Comments
hashcat Rule Optimisation
Optimising hashcat rules for better cracking Continue reading
Posted in password cracking
Leave a comment
3DES is finally actually broken!
3DES has been properly broken. Drop support quick! Continue reading
Posted in crypto, Pentest
Leave a comment
7Safe Ethical Hacking Courses accredited by CREST
I’m pleased to write that 7Safe (my employer) have recently had all of their Ethical Hacking courses accredited by CREST! This is extremely good news as it shows the level of hard work and commitment that is given to maintaining and continually … Continue reading
Quick tricks to beat the Flick
So here’s my guide to another CTF from VulnHub called Flick:1. This one was actually released before Tr0ll:1, but I finished this one after as I was trolled so much on the first one I had to take a break … Continue reading
Getting trolled by a tr0ll…
Here’s my rundown of Tr0ll:1, a boot2root on Vulnhub that I had some fun with a few weeks back. I did feel like I was being trolled as I went at it and there were moments where I nearly needed to … Continue reading
1st Post!
Well here we are! Hopefully in time my random thoughts about penetration testing and maybe some digital forensics will find themselves here, so that as time goes on and my thirst for knowledge grows, the old knowledge that falls out will land … Continue reading