Skip to content

getlost01/Goldman-Sachs-Crack-Leaked-Passsword-Database

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

Goldman-Sachs-Crack-Leaked-Passsword-Database

Project Objective

What type of hashing algorithm was used to protect passwords?

What level of protection does the mechanism offer for passwords?

What controls could be implemented to make cracking much harder for the hacker in the event of a password database leaking again?

What can you tell about the organization’s password policy (e.g. password length, key space, etc.)?

What would you change in the password policy to make breaking the passwords harder?

Resources

Given Password Dump for task to crack.


Password cracking explained (techniques described in 2013 still haven’t changed)
Password salting
Hash functions
Password cracking tools
Password strength checker

Task detail

Full detail of given task is here
I personally prefer dcode for decode hash keys, this is best decoder which I have used.

Releases

No releases published

Packages

No packages published