Norbert Tihanyi

@TihanyiNorbert

Evangelist, Researcher, Security Expert ,OSCP, OSCE, OSWP, CEH, E|CES,... player!!!!4!!!four!!!

Budapest, Hungary
Vrijeme pridruživanja: travanj 2019.

Tweetovi

Blokirali ste korisnika/cu @TihanyiNorbert

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @TihanyiNorbert

  1. Prikvačeni tweet
    13. lis 2019.

    Hi guys! A new puzzle for crypto fans. Can you find the cryptographic flaw in this tiny example? , ,

    Prikaži ovu nit
    Poništi
  2. 10. sij

    Lesson learned: always check the source code what actually is doing.

    Prikaži ovu nit
    Poništi
  3. 9. sij

    During a pentest I found an MD5 hash in a config file. hashcat found that the cleartext password is: cleartextpassword123 I tried to login several times unsuccessfully, when realized that the actual password is :3255013d82b3c3796649b2dfbf79f209 😀😀

    Prikaži ovu nit
    Poništi
  4. 22. lis 2019.

    Plaintext passwords are slower to crack by than NTLM passwords. So I changed my Windows AD environment to store passwords in cleartext instead of NTLM 😀😋

    Poništi
  5. 14. lis 2019.

    Dear OSCP candidates, No... Using sudo -u#-1 or sudo -u#4294967295 command is not the intended way to compromise a machine 😀

    Poništi
  6. 14. lis 2019.

    If you found the timing side channel attack you were right. The difference between the good and bad solution is only one "TAB".

    Prikaži ovu nit
    Poništi
  7. 30. kol 2019.

    Hi crypto fans! A new challenge for You! Provide two strings for which the function returns true. , ,

    Poništi
  8. 12. kol 2019.

    I was in a bookstore yesterday in Abu Dhabi. Here is the conversation. Me: Do you have any computer science or maths book? Shopkeeper: Yes we have. And she escorted me to the science fiction section. 😃

    Poništi
  9. 7. kol 2019.

    “I have discovered a truly marvelous collision for SHA-512 but the margin of Twitter is too narrow to write it down” 😀- Pierre de Fermat

    Poništi
  10. proslijedio/la je Tweet
    6. kol 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    Here's another one, but with SHA256. For SHA384 it will require some more computing power (printable characters only).

    Poništi
  11. 6. kol 2019.

    For SHA224 we have PBKDF2-HMAC-SHA224 collision The output is the same for the two string: LTbCSH0TH2KFftkQUDINVjbISYW/ad5ELzlSFA== , , , , , , ,

    Poništi
  12. 18. srp 2019.

    I think this application is using strong cryptography. Can you guys find out the hashing algorithm? 😀

    Poništi
  13. 12. srp 2019.

    Good day, folks! A challenge for fans! SHA-256 hash is retrieved from a database using : 33E50E30C3E1150B8E5575BC551DBBB42146C148D1C2FB32337E638F Unfortunately 8 hex chars are randomly missing. Recover the cleartext password! , ,

    Poništi
  14. 9. srp 2019.

    ===Type juggling=== After SHA-224 announcing the first magic hash for SHA-256. Using distributed computing found a magic hash for SHA-256. For SHA-256(34250003024812) we have 0e46289032038065916139621039085883773413820991920706299695051332 ,

    Poništi
  15. 4. srp 2019.

    Hey guys! A new crypto challenge for You! Recover the cleartext password! Unfortunately two hex characters are missing. 😉 One from the encKey XML tag and one from the encPassword XML tag. , ,

    Prikaži ovu nit
    Poništi
  16. 2. srp 2019.

    Are you an RSA CTF fan? Here is a real life challenge for You. Recover P and Q primes from the 2048 bits N modulus issued by COMODO for ! , ,

    Poništi
  17. 1. srp 2019.

    A challenge for CTF players and crypto fans. Give me a valid serial number for which the function returns true: , ,

    Poništi
  18. 29. lip 2019.

    After OSCP, OSCE, OSWP I just finished the AWAE online course. I can confirm that the material & examples are awesome even after 10+ years pentest experience. The material is up to date and very hands on. Good jobb !!

    Poništi
  19. 29. lip 2019.

    Now, I'm totally confidence that every device of smart homes are full of backdoors. Siri just accidentally admitted the truth: 😋

    Poništi
  20. 28. lip 2019.

    The first challenge solved by . Nice :) Here is the next one. This time with strict comparison "===":

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·