SIGPwny
  • About
  • Meetings
  • Publications
  • Sponsors
  • Join
Pwny CTF
    • Week 15: End of Year Social
    • Week 14: Gaming Hacking
    • Week 14: Kernel Pwn
    • Week 12: HackTheBox Walkthrough
    • Week 13: AI Hacking
    • Week 10: Phishing
    • b01lers CTF 2025
    • Week 12: Blockchain
    • Japan House Social
    • Week 09: GOAD: Installing Logging & Forensics Tools
    • UIUCTF 2025 Development
    • Tracer FIRE 2025
    • Sandia National Labs: Info, Careers, Q&A
    • eCTF 2025 All-Team
    • Double Jeopardy! DiceCTF 2025 + TAMUctf 2025
    • Week 09: Esoteric Languages
    • Week 09: Hands-On Intro to Metasploit
    • LAN Party
    • Week 06: Reverse Engineering AV for Evasion
    • Week 06: PWN IV: Heap Exploitation
    • eCTF 2025 All-Team
    • Digital Forensics I: SIFT
    • Week 06: Password Cracking
    • Week 05: Offensive Infrastructure & Secure C2
    • eCTF 2025 All-Team
    • Week 05: Security Careers
    • Week 05: Cryptography IV: Elliptic Curve Cryptography
    • eCTF 2025 All-Team (Design Week 6)
    • Week 04: PWN III: ROP
    • Week 04: HackTheBox 4v4s
    • SIGPwny x SIGPolicy: Cyberwarfare
    • eCTF 2025 All-Team (Design Week 5)
    • Week 04: Midwest CCDC Qualifiers (Active Roster Only)
    • Week 03: Windows Hardening Review
    • Week 03: Cryptography III: Block and Stream Ciphers
    • Week 03: Windows & Windows Privilege Escalation Review
    • Canceled: eCTF 2025 All-Team (Design Week 4)
    • LA CTF 2025
    • Week 02: Linux Hardening Review
    • Week 02: Java and Android Reverse Engineering
    • Week 02: Linux Privilege Escalation Review
    • FUZZWARE: Fuzzing Firmware
    • eCTF 2025 All-Team (Design Week 3)
    • Week 01: Web Hacking III: Server-Side Exploits
    • Week 01: Network Security Review
    • Week 00: Welcome Back!
    • eCTF 2025 All-Team (Design Week 2)
    • eCTF 2025 Design Meeting
    • eCTF 2025 Kickoff
    • eCTF Info Meeting
    • IrisCTF 2025
    • Week 14: Hot Chocolate Social
    • Week 14: Networking Security
    • Week 12: Offensive Development
    • eCTF Meeting
    • Week 12: Forensics
    • Week 10: Attacking Hardened Environments
    • Week 11: Ethics and Law
    • eCTF Info + Development
    • Week 10: Python Jails
    • Week 10: Active Directory III
    • Week 09: PWN II
    • Week 09: Snort: Installation & Configuration, Overview & Strategy
    • Week 09: Live Active Directory Attacks
    • Timing Side Channel Lab
    • Week 08: Cryptography II
    • Week 08: Secure DNS, E-Mail, FTP, SMB, DACL & AD + CyberForce Strategy
    • Week 08: Cryptography I
    • Week 08: Active Directory II
    • Week 07: PWN I
    • Week 07: System Administration Active Directory
    • Week 07: Physical Security and Lockpicking
    • Hivestorm 2024
    • Week 07: Active Directory I
    • Introduction to Side Channels
    • Week 06: Operational Security
    • Week 06: Hardening Default Windows Installations & Process Isolation
    • Week 06: Reverse Engineering II
    • Week 06: Windows & Windows Privilege Escalation
    • Week 05: x86-64 Assembly
    • BRICS+ CTF Qualifier
    • Week 05: Firewalls, Network Inspection, Traffic Monitoring, & Defense Strategy
    • Week 05: Reverse Engineering I
    • Week 05: Linux Privilege Escalation
    • Getting Started with Rust
    • BuckeyeCTF 2024
    • Week 04: Network Forensics and Wireshark
    • Week 04: OSINT I
    • Week 04: Web Hacking for Red Teams
    • Week 03: Network Security & Active Recon
    • Week 02: Web Hacking II
    • Week 02: Intro to Blue Teaming
    • Week 02: Web Hacking I
    • Intro to Embedded Systems
    • Week 02: Intro to Red Teaming
    • Week 01: Intro to Terminal and Setup
    • Bowling Social
    • Week 00: Introduction
    • Week 14: MPC (Multi-Party Computation)
    • Week 14: Supply Chain Attacks & Policy
    • Week 12: Location-Based OSINT
    • Week 12: Symbolic Execution
    • Week 10: Japan House Social
    • Week 10: AI Hacking
    • Week 09: Linux Kernel Exploitation
    • Week 09: Tracer FIRE
    • Week 09: Block and Stream Ciphers
    • Week 09: WiCyS Cryptography CTF
    • Week 07: Esoteric Languages
    • Week 06: Password Cracking
    • Week 05: Blockchain
    • Week 04: PWN IV - ROP
    • Week 03: PWN III - Heap Exploitation
    • Week 03: ARM Assembly
    • Week 02: Intro to Pentesting
    • Week 01: Editors
    • Week 00: Hot Cocoa + Board Games Social
    • Week 00: Welcome Back
    • Week 14: Cloud Security
    • Week 14: Web Hacking III
    • Week 12: Python Jails
    • Week 11: Antivirus and EDR Evasion
    • Week 10: Ethics and Law
    • Week 10: Forensics Workshop with CrowdStrike
    • Week 09: Workshop with Caesar Creek Software
    • Week 09: Physical Security and Lockpicking
    • Week 08: PWN II
    • Week 08: PWN I
    • Week 07: Crypto II
    • Week 07: Crypto I
    • Week 06: DRM Circumvention
    • Week 06: Reverse Engineering II
    • Week 05: x86-64 Assembly
    • Week 05: Double CTF! BuckeyeCTF 2023 + MapleCTF 2023
    • Week 05: OSINT I
    • Week 04: Reverse Engineering I
    • Week 03: Reverse Engineering Setup
    • Week 03: Web Hacking II
    • Week 02: Intro to Terminal and Setup (Session 2)
    • Week 02: PatriotCTF 2023
    • Week 02: Web Hacking I
    • Week 01: Intro to Terminal and Setup (Session 1)
    • Week 01: Bowling Social
    • Week 00: Introduction
    • Week 14: Reconnaissance + IoT Security with CypherCon
    • Week 14: Java Reverse Engineering
    • Week 13: UIUCTF 2023 Planning
    • Week 13: Crypto III: Block Ciphers
    • Week 12: Esoteric Languages
    • Week 11: UEFI Reverse Engineering
    • Week 11: Password Cracking
    • Week 09: AI Hacking II
    • Week 09: AI Hacking I
    • Week 06: Fuzzing
    • Week 06: Quantum Computing
    • Week 05: Nintendo DSi Browser Hacking
    • Week 05: Reverse Engineering III
    • Week 04: PWN IV: Heap
    • Week 04: Pentesting I
    • Week 03: PWN III: ROP
    • Week 02: Bypassing macOS Privacy Controls for Fun and Profit
    • Week 02: Web Hacking III
    • Week 01: Setup
    • Week 00: Welcome Back
    • Week 15: Introduction to Secure Computation
    • Week 14: SPR@I: "Machine Learning Threats"
    • Week 14: PWN II
    • Week 12: Forensics
    • Week 11: SPR@I: "Glyph Positions Break PDF Text Redaction"
    • Week 11: Python Jails
    • Week 10: SPR@I: "Preventing Large-Scale Cloud Attacks"
    • Week 10: Operational Security
    • Week 09: Physical Security and Lockpicking
    • Week 08: SPR@I: "All Eyes On Me"
    • Week 08: Reverse Engineering II
    • Week 07: Crypto II
    • Week 07: Crypto I
    • Week 06: Ethics and Law
    • Week 06: PWN I
    • Week 05: x86-64 Assembly
    • Week 05: OSINT I
    • Week 04: Reverse Engineering I
    • Week 03: Reverse Engineering + Pwn Setup
    • Week 03: Web Hacking II
    • Week 02: How to CTF (CSAW CTF Qualifications 2022)
    • Week 02: Web Hacking I
    • Week 01: Setup
    • Week 00: Introduction
    • Week 13: AI Security
    • Week 12: Crypto Math II: Lattice Attacks
    • Week 12: SPR@I: "Lord of the Rings" CPU Side-Channel
    • Week 11: RATs with ICCSP, Spray Paint Social
    • Week 11: Password Cracking
    • Week 10: Network and Security Research Group (NSRG)
    • Week 10: UIUC Technology Services Cybersecurity AMA
    • Week 09: UIUCTF 2022 Planning II
    • Week 09: Security Careers
    • Week 07: Social Event
    • Week 06: Intro to Pentesting
    • Week 05: Crypto Math I
    • Week 05: Windows Environments
    • Week 04: IoT Security (Paper Reading)
    • Week 04: Python Jails
    • Week 03: RSA Factoring
    • Week 02: Log4J
    • Week 02: Format Strings
    • Week 01: UIUCTF 2022 Planning I
    • Week 01: ROP (Return Oriented Programming)
    • Week 00: Fall Research Show and Tell
    • Week 00: Welcome Back
    • Week 14: Mobile Application Hacking
    • Week 14: Java Reverse Engineering
    • Week 12: Recursive Meeting
    • Week 11: Wireless Security
    • Week 11: Networking
    • Week 10: OSINT II
    • Week 10: OSINT I
    • Week 09: SIGPwny Spooky Summary
    • Week 09: Forensics
    • Week 08: The Big Rick
    • Week 08: Physical Security (Lockpicking)
    • Week 07: PWN II
    • Week 07: PWN I
    • Week 06: Reverse Engineering II
    • Week 06: Reverse Engineering I
    • Week 05: Law and Ethics
    • Week 05: Operational Security
    • Week 04: Crypto II
    • Week 04: Crypto I
    • Week 03: CSAW CTF Qualifications 2021 Recap
    • Week 03: Web Hacking II
    • Week 02: Web Hacking I
    • Week 01: Terminal
    • Week 01: Tutorial
    • Week 00: Setup
    • Week 00: Introduction
    • Week 12: How to Make CTF Challenges
    • Week 11: Docker
    • Week 10: HackIllinois... Literally! (Workshop)
    • Week 09: Recursive Meeting
    • Week 08: Pwny Racing
    • Week 07: Reverse Engineering Tools
    • Week 06: Basics of Cryptography
    • Week 05: Dynamic Linking and GOT/PLT
    • Week 04: Ethereum Security (Paper Reading)
    • Week 04: Sandbox/Jail Escapes
    • Week 03: Heap Exploitation II and III, Show and Tell
    • Week 02: Web Hacking: Path Traversal and SSRF
    • Week 00: Heap Exploitation I
    • Week 14: Web Hacking: XSS and SQL Injection
    • Week 12: Wireless Security
    • Week 09: Intro to OpSec
    • Week 08: Binary Exploitation Help Session
    • Week 07: Binary Exploitation
    • Week 06: Password Cracking and SQL Injection
    • Week 04: CLI Tools (R2, tmux, vim)
    • Week 03: Tutorial
    • Week 02: Introduction
    • Week 10: Java Reverse Engineering
    • Week 06: SQL Injection
    • Week 05: Lockpicking
    • Week 04: Bash
    • Week 03: Binary Exploitation (Part 2)
    • Week 02: Binary Exploitation (Part 1)
    • Week 01: Introduction (feat. Purdue) [LEGENDARY]
    • Week 14: DEF CON Talk Watch Party
    • Week 12: Discord Hacking
    • Week 11: CSAW CTF Finals 2019 Recap
    • Week 09: Intro to Forensics
    • Week 08: Recursive Meeting
    • Week 07: Intro to OpSec
    • Week 06: Intro to Crypto
    • Week 05: CLI Tools (R2, tmux, vim)
    • Week 04: Web Hacking
    • Week 03: Game Hacking
    • Week 02: Intro to Web (Natas)
    • Week 01: Introduction and Setup
    • Week 13: Discord Hacking
    • Week 11: Intro to OSINT
    • Week 10: Intro to RE + PWN with Northrop Grumman
    • Week 08: DynamoRIO
    • Week 07: Game Hacking
    • Week 06: Natas Web Hacking
    • Week 04: Linux Infrastructure
    • Week 03: UnderTheCTF
    • Week 14: Intro to Networking
    • Week 11: Intro to OpSec
    • Week 10: Format String Vulnerabilities
    • Week 09: Intro to Forensics
    • Week 08: Intro to Cryptography
    • Week 07: Intro to Web
    • Week 06: Intro to Reverse Engineering
    • Week 04: Intro to PWN
    • Week 03: Intro to Unix and CLI
    • Week 01: Introduction
    • Week 11: Modern Binary Exploitation
    • Week 10: TF2 LAN Party
    • Week 06: Intro to Reverse Engineering (Part 2)
    • Week 05: Lockpicking
    • Week 04: Intro to Reverse Engineering (Part 1)
    • Week 03: CSAW CTF Qualifications 2017 Recap
    • Week 02: Intro to CTF
    • Week 01: Introduction
    • Week 08: Reverse Engineering (Part 2)
    • Week 07: Reverse Engineering (Part 1)
    • Week 05: Intro to OpSec
    • Week 04: Intro to Crypto
    • Week 03: Number Bases (Binary, Hexadecimal, Base64)
    • Week 03: Intro to CTF (Part 2)
    • Week 02: Intro to CTF (Part 1)
    • Week 01: Introduction

Password Cracking

SP2023 Week 11

crypto
password cracking
hashing
wordlists
salting
rainbow tables
hashcat
Minh Duong,
Emma Hartman
Thursday, April 6th, 2023
6 – 7 PM (CDT)
Siebel CS 1404

Watch video

Download slides


Sitemap

About

Meetings

Publications

Sponsors

Join

Connect

Discord

GitHub

Instagram

Twitter

YouTube

© 2025 SIGPwny. ACM@UIUC is a 501(c)(3) non-profit organization. Site source on GitHub.