Chick3nman512 Profile Banner
Chick3nman 🐔 Profile
Chick3nman 🐔

@Chick3nman512

Followers
3K
Following
15K
Media
130
Statuses
4K

Sam Croley, Austin based password cracker & researcher; Team @hashcat Core Dev; CEO of Detack Inc. - @DetackGmbH; DMs always open

Austin, TX
Joined March 2009
Don't wanna be here? Send us removal request.
@Chick3nman512
Chick3nman 🐔
9 months
Complete @hashcat benchmarks on the @NVIDIAGeForce RTX 5090 FE! Running nice and cool so far with solid improvements across the board. Most hash modes got at least a 20% uplift over the RTX 4090 and some modes boasting quite a bit more! Full Benchmark: https://t.co/aJ9zI1HjGM
4
22
84
@Chick3nman512
Chick3nman 🐔
2 months
While the intent is likely good, machine random passwords including uppercase, lowercase, numbers, and symbols only need to be ~13 characters regardless of hashing algorithm (ignoring truncated algos like LM or DEScrypt). Worth knowing for envs where “short” limits still exist.
@sebp888
Sebastian
2 months
A few months ago, I hacked my own wifi password with a simple brute force attack. It was my first time testing the program. My 5-year old RTX 3080 only took 4 hours to crack the 11-digit password: 1 made-up word, 4 numbers, 1 special character. Your passwords, especially wifi,
0
2
7
@hashcat
hashcat
2 months
First look at the dynamic hash-mode support in upcoming hashcat, powered by the new Rust Bridge. No coding needed: write your pattern on the command line. Don't want to wait for Release? Try it now via GitHub master or https://t.co/B0Ik8dvvmv. Feedback welcome on our Discord
0
47
147
@hashcat
hashcat
2 months
hashcat v7.1.0 released! This update includes important bug fixes, new features, and support for new hash-modes, including KeePass with Argon2. Read the full write-up here: https://t.co/rg8zfMUt3B
5
48
161
@hashcat
hashcat
3 months
We just finished the Jabbercracky password contest at DEFCON 33! Check out our writeup on using the new Python Bridge in hashcat 7 for rapid prototyping a solution to an unsupported hash mode: https://t.co/HG3o80bAbt
0
18
89
@hashcat
hashcat
3 months
Team Hashcat took first place in the Jabbercracky contest at #DEFCON33! Thanks to HashMob for putting up a great fight and congrats on 2nd place! We're looking forward to your write-up! Huge thanks to Jabbercracky, @Stealthsploit, and @PasswordVillage for organizing!
5
37
234
Wrote up a new blog entry on improving the OMEN password cracking algorithm. The changes have also been included in the new version of the PCFG password cracking toolset. Link:
0
5
5
@IceSolst
solst/ICE of Astarte
3 months
Some comments say the password should be hashed client side. No, that is not good practice: - you’re replacing the password with hash(password), all else equal, so no benefit there. New hashed pw can still be stolen. - it still needs to be salted and hashed on the backend. -
@IceSolst
solst/ICE of Astarte
3 months
HTTP request POST data. Once saw a pentester report this to a client (there was TLS). Anyone who’s used burp at least once knows this is how webapps work.
36
19
257
@hashcat
hashcat
3 months
hashcat v7.0.0 released! After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had. Detailed writeup is available here: https://t.co/fxAIXNXsEr
22
377
1K
@Paul_Reviews
Paul Moore - Security Consultant 
3 months
Yep, there's something seriously wrong here. I've just walked in from a night out. The UI has logged me out - but the endpoint for fetching passwords still has everything in plain text. You might want to fix this @CyberFoxLLC
@Paul_Reviews
Paul Moore - Security Consultant 
3 months
Are you really decrypting the entire vault on the server? I'm able to call the vault GET API and see everything in plain text - outside of the app!
0
1
4
@Paul_Reviews
Paul Moore - Security Consultant 
3 months
Are you really decrypting the entire vault on the server? I'm able to call the vault GET API and see everything in plain text - outside of the app!
@CyberFoxLLC
CyberFOX
3 months
See Password Boss WebApp in action! Catch our live demo on July 24th at 2:00 PM EDT! Sales Engineer Jonathan Figueroa-Colón will walk you through how our password manager helps keep your business secure and your team productive! 👉 Sign up here: https://t.co/eA5ZqLoaeB
1
1
11
@vxunderground
vx-underground
3 months
51
102
1K
@AlecMuffett
Alec Muffett
4 months
July 15th 1991: 34 years ago I published the first “modern” password cracker…
4
4
14
@Paul_Reviews
Paul Moore - Security Consultant 
4 months
This is one of the reasons so many apps are still vulnerable in 2025. This "master of information security" recommends #SHA256 to hash passwords and uses salts to defeat rainbow tables. #sigh
0
1
3
@CynoPrime
CynoSure Prime
5 months
Tired of your password rules being half-baked? The CsP kitchen’s been cooking up something better. RuleChef serves Markov-seasoned rules that actually make sense. No more recipe-for-disaster rule sets. https://t.co/t2UHVtDbpj
github.com
a markov based rule generator for hashcat/mdxfind/jtr - Cynosureprime/rulechef
0
7
11
@Chick3nman512
Chick3nman 🐔
7 months
“the password will be hashed via SHA-512 before being passed to bcrypt” @bunjavascript makes the classic mistake of prehashing before applying bcrypt instead of enforcing an input length limit. This is not only less safe, it’s specifically called out here
@bunjavascript
Bun
7 months
Roll your own auth with `Bun.password`
0
0
13
@winxp5421
winxp5421
7 months
Test hashes are live! Test your submission platform / scripts.
@winxp5421
winxp5421
8 months
Oh hey, #crackthecon is back @CypherCon this year. Come crack some passwords. https://t.co/h2ynkegecO
0
4
6
@Chick3nman512
Chick3nman 🐔
9 months
5
0
23
@lakiw
10 months
Question: Is there a repository of password/credential spaying wordlists collected via honeypots (or similar methods). Bonus points if it is indexed by known threat actors. This would be an amazing resource for researchers.
0
2
4
@Chick3nman512
Chick3nman 🐔
1 year
Not sure what the expected service life is for a Yubikey, but my oldest(>10yrs of hard use) is still going strong despite lacking a little luster. I guess this is what @Yubico means when they say “strong multi-factor”. 🔐
8
13
164