|
You are here |
www.da.vidbuchanan.co.uk | ||
| | | | |
dusted.codes
|
|
| | | | | SHA-256 is not a secure password hashing algorithm | |
| | | | |
www.mitls.org
|
|
| | | | | This page describes the miTLS verified TLS implementation and presents attacks, such as Triple Handshake, SMACK, FREAK, Logjam, and SLOTH | |
| | | | |
notes.volution.ro
|
|
| | | | | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms. | |
| | | | |
blog.ropnop.com
|
|
| | | After compromising an OpenNMS server, I recovered salted password hashes. I couldn't find any info online, so I reversed them and wrote a tool to crack them | ||