John the Ripper: cracking my own password hashes
I ran John the Ripper against the password file from one of my own machines. Within a few hours, three of my friends' passwords were broken. The lesson is uncomfortable and largely about defaults.
Long-form thinking on cyber defence, detection, and resilience — from Slackware-era honeypots through to AI-driven SOC analytics.
Showing posts tagged auditing — 1 result.
I ran John the Ripper against the password file from one of my own machines. Within a few hours, three of my friends' passwords were broken. The lesson is uncomfortable and largely about defaults.