In the Shack

Rainbow Tables: Bookkeeping for Password Crackers

Rainbow Tables: Bookkeeping for Password Crackers

Archit Choudhary

When trying to solve a computational problem, you have two resources. Time and memory (space). Methods like dictionary attacks and brute-forcing are time-based attacks because it takes very long each...

Rainbow Tables: Bookkeeping for Password Crackers

Archit Choudhary

When trying to solve a computational problem, you have two resources. Time and memory (space). Methods like dictionary attacks and brute-forcing are time-based attacks because it takes very long each...

Hash Cracking Crash Course

Hash Cracking Crash Course

Archit Choudhary

There was a time when passwords were stored in plaintext on servers where people made accounts. This was a time many hackers reminisce about. This was also a time where...

Hash Cracking Crash Course

Archit Choudhary

There was a time when passwords were stored in plaintext on servers where people made accounts. This was a time many hackers reminisce about. This was also a time where...

How to Build a Packet Sniffer in C — From Scratch

How to Build a Packet Sniffer in C — From Scratch

Archit Choudhary

By the end of this blog post, you will have made a packet sniffer in C. It is a program that Tells you which packets are flowing in and out...

How to Build a Packet Sniffer in C — From Scratch

Archit Choudhary

By the end of this blog post, you will have made a packet sniffer in C. It is a program that Tells you which packets are flowing in and out...

GDB terminal prompt

It's Time to Grow Up and Learn GDB

Archit Choudhary

By the end of this blog post, you will know how to use GDB to debug not just any piece of C code, but any binary executable in general. Even...

It's Time to Grow Up and Learn GDB

Archit Choudhary

By the end of this blog post, you will know how to use GDB to debug not just any piece of C code, but any binary executable in general. Even...