"@bl4ckt0ts: hetzner got hacked: http://wiki.hetzner.de/index.php/Security_Issue/en … and http://pastebin.com/WfhEtmRS " ouch.. and more weak password hashes exposed...
-
-
Replying to @delroth_
@delroth_@veorq http://hashcat.net/oclhashcat-plus/ … 1 billion hashes/sec with a single 7970/6990. A few days for anything 9 characters, at most2 replies 0 retweets 0 likes -
Replying to @floodyberry
@floodyberry@veorq also, you don't include the salt size in the 9 chars, which we don't know and could be arbitrary characters1 reply 0 retweets 0 likes -
Replying to @delroth_
@delroth_@floodyberry the salt size or its character sets is not important2 replies 0 retweets 0 likes
Replying to @veorq
@veorq @floodyberry I'm not saying they couldn't have done better, just saying that compared to what we've been used to it's very good.
1:23 PM - 6 Jun 2013
0 replies
0 retweets
0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.