"@bl4ckt0ts: hetzner got hacked: http://wiki.hetzner.de/index.php/Security_Issue/en … and http://pastebin.com/WfhEtmRS " ouch.. and more weak password hashes exposed...
-
-
Replying to @delroth_
@delroth_@veorq http://hashcat.net/oclhashcat-plus/ … 1 billion hashes/sec with a single 7970/6990. A few days for anything 9 characters, at most2 replies 0 retweets 0 likes -
Replying to @floodyberry
@floodyberry@veorq also, you don't include the salt size in the 9 chars, which we don't know and could be arbitrary characters1 reply 0 retweets 0 likes -
Replying to @delroth_
@delroth_@floodyberry the salt size or its character sets is not important2 replies 0 retweets 0 likes
Replying to @veorq
@veorq @floodyberry it completely kills the ability to perform efficient parallel hash computations
1:22 PM - 6 Jun 2013
0 replies
0 retweets
0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.