|
|
(не показана 1 промежуточная версия этого же участника) |
Строка 1: |
Строка 1: |
| = Лекция =
| | [[Криптография/Основы_криптографии]] |
| | |
| * [https://khashaev.ru/assets/secsem/crypto-101/slides.pdf Презентация с лекции]
| |
| | |
| = Книги для начинающих =
| |
| * [https://www.crypto101.io/ Crypto101]
| |
| | |
| = Подборка статей про хэш-функции и хранение паролей =
| |
| * [http://www.mathstat.dal.ca/~selinger/md5collision/ MD5 Collision Demo]
| |
| * [https://blog.skullsecurity.org/2012/everything-you-need-to-know-about-hash-length-extension-attacks Everything you need to know about hash length extension attacks]
| |
| * [https://crypto.stackexchange.com/questions/8/why-do-we-append-the-length-of-the-message-in-sha-1-pre-processing Why do we append the length of the message in SHA-1 pre-processing?]
| |
| * [https://www.bentasker.co.uk/blog/security/201-why-you-should-be-asking-how-your-passwords-are-stored Why You Shouldn't be using SHA1 or MD5 to Store Passwords]
| |
| * [https://codahale.com/how-to-safely-store-a-password/ How To Safely Store A Password]
| |
| * [http://blog.ircmaxell.com/2011/08/rainbow-table-is-dead.html The Rainbow Table Is Dead]
| |
| * [http://blog.thireus.com/cracking-story-how-i-cracked-over-122-million-sha1-and-md5-hashed-passwords How I Cracked Over 122 Million SHA1 and MD5 Hashed Passwords]
| |
| | |
| = Инструменты =
| |
| == Инструменты для криптоанализа ==
| |
| * [https://github.com/hellman/xortool XORTool] — инструмент для криптоанализа XOR-шифра с периодом
| |
| <small>Внимание: стабильно работает только под Python 2.</small>
| |
| * [https://github.com/iagox86/hash_extender Hash Extender] — инструмент для атаки удлинением сообщения
| |
| | |
| == Инструменты для перебора паролей ==
| |
| * [https://hashcat.net/hashcat/ hashcat]
| |
| * [https://www.openwall.com/john/ John The Ripper]
| |