Тёмный

Decrypting a BorgBackup Archive with Hashcat: TryHackMe Cyborg Challenge 

Drew Alleman
Подписаться 2 тыс.
Просмотров 436
50% 1

My Github: github.com/Drew-Alleman
-- Resources --
book.hacktricks.xyz/welcome/r...
gtfobins.github.io/
github.com/danielmiessler/Sec...
highon.coffee/blog/reverse-sh...
github.com/BlackArch/webshells

Опубликовано:

 

3 ноя 2023

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 4   
@kdkjlfk
@kdkjlfk 2 месяца назад
Great content
@humanbeing2730
@humanbeing2730 8 месяцев назад
nice 👍
@drewalleman
@drewalleman 8 месяцев назад
Thanks!
@ThomasWaldmann
@ThomasWaldmann 20 дней назад
Greetings from BorgBackup development! Nice hacking, but maybe you want to clarify the video title: You did not decrypt a borgbackup archive with hashcat. What you did is crack an apache apr1 hash with hashcat, which revealed a password that was also used as the borg key passphrase. So you had the borg key and the cleartext passphrase to use the borg key and that's all needed to use that key and the repo protected by that key.
Далее
TryHackMe: Cyborg Walkthrough
22:08
Просмотров 534
Why The Windows Phone Failed
24:08
Просмотров 56 тыс.
The Creepiest OSINT Tool to Date
8:54
Просмотров 618 тыс.
TryHackMe: Cyborg - Walk-through
22:23
Просмотров 1,4 тыс.
Run your own AI (but private)
22:13
Просмотров 1,3 млн