Skip to main content

GPU Based Hash Cracking and Password Compliance Auditing

A presentation of mine discussing the significance and intermediate application of cryptography for most modern systems. There is also a proof of concept discussing what weaknesses lie in modern cryptographic hash functions.

Wordlist used: Probable Wordlists

Rule used: One Rule to Rule Them All

Rayce Toms

Student Researcher


Comments