Brute force the password hashes. The first dollar sign marks the type of the has, the second the salt, and the third the hash.
Brayden Cruz
>most dutch registrars set up dnssec by default >none of the foreign registrars (read American) seem to do it >wonder if I should let it affect my decision whether or not I should use an American registrar Does dnssec really matter for personal email? It seems a bit unlikely to be targeted for a dns poisoning attack. Or am I wrong?
Tyler Ramirez
you could always do on a later date and focus on low hanging fruit first
Jackson Lewis
Dutch registrars get a discount on .nl domains from the registry if they set up dnssec. Thats why they do it.
Andrew Thompson
...
Austin Wilson
Does that mean you could just do a hex to ascii conversion?
Sebastian Ward
yes
Chase Brown
I tried that but just got random characters.
I'm missing something, surely.
Also where's a good place to learn about this stuff. Could you maybe give me some key words to start researching with?
Easton Scott
maybe it is substation cypher
Joshua Sanchez
Is all this hexadecimal stuff related to machine language?
Daniel Williams
pretty much
Anthony Hall
Good enough for me
Christian Cox
bump
JOIN THE CTF TEAM
Kevin Sullivan
I'm pretty shit and would just be in it to learn so I can suck less. Can I still join?
Christian Kelly
sure like the op says it is open to all
Connor Brooks
Joining on ctftime won't actually do anything.
Joshua White
same with shit posting
Elijah Brown
What's the IRC server?
Christian Scott
Rizon
Luke Fisher
It'll help with Sup Forumss e-penis issue.
Joseph Sanchez
I have not translated those chars and maybe Im firing bullets to air, BUT i would check for endiandness and look if makes more sense.
Brandon Parker
I'll look into it, thanks
Matthew Butler
/sec/ convince me to watch Lain.
Jayden Sanders
How are you liking it?
Kevin Bennett
Liking what?
Caleb Ortiz
Lain
Jayden Martin
I wouldn't know, I haven't started. She seems to be cute though
Colton Bell
what's the IRC server on? freenode?
I'm too new to know otherwise, but I promise not to shit it up with questions, I just wanna lurk and learn.
Aiden Cox
Rizon. Not a single issue with making questions, most of us are here to learn after all, be it at a lower or higher level.
Eli Bailey
BUMP CTF SOON
Kayden Richardson
Actually, here's a question, how does one use a socks5 proxy legit? As in, everything is piped through it, even shit like Flash. I never did get that working right and still can't. Admittedly with minimal trying.
Why? Why for shitposting of course! Every try I did, Flash always got the actual IP and not the proxy.
Nicholas Wright
no
Daniel Cox
You guys know about the Charlie hashes for pctf right? I hope you're in irc
Brody Hughes
It give off a great nostalgic feeling for the Internet of the 90s and has a nice soundtrack.
Charles Smith
>internet of the 90's sigh ^_^
Getting old fuckin' sucks.
Caleb Howard
Can someone give me the use case for passphrase-protected encrypted SSH keys, as opposed to unencrypted keys?
Everyone says you better use encrypted keys if you know whats good for you, but as far as I can see they protect against a very narrow threat. First, they protect against physical access. Someone steals your laptop or clones your drive while you're not around. Full-disk encryption is available, easy, and protects much more than just your SSH keys. Second, they protect against someone stealing your keys some other way and then using them, like via malware or some kind of remote exploit. But if someone exploits my machine to the extent that they can exfiltrate my encrypted SSH keys, they could also just keylog me when I type in the passphrase to use my SSH keys, snatch the keys out of memory when I have them unlocked, or whatever.
So encrypted SSH keys defend me against someone who exploits my machine, but whose ability to use that exploit is intermittent or incomplete, so that they can't crab the keys when I decrypt them for use. How is this very helpful? What am I missing here?