hash   8241

« earlier    

alecritson/Slugged | Craft Plugin
A Craft plugin to auto generate hashed slugs for entries using Hashids php library
craft  craft-plugin  url  hash  random  uid 
3 hours ago by ijy
PHP | Hashids
Hashids is a small open-source library that generates short, unique, non-sequential ids from numbers.

It converts numbers like 347 into strings like “yr8”, or array of numbers like [27, 986] into “3kTMd”.

You can also decode those ids back. This is useful in bundling several parameters into one or simply using them as short UIDs.
hash  uid  php 
3 hours ago by ijy
Bitcoin Hashrate Distribution
List of who controls Bitcoin. The two biggest (BTC.com and AntPool) together are Bitmain
bitmain  bitcoin  hash  consensus  blockchain 
16 hours ago by nelson
mitm6 – compromising IPv4 networks via IPv6 | Fox-IT International blog
Running the attack itself is quite straightforward. First we start mitm6, which will start replying to DHCPv6 requests and afterwards to DNS queries requesting names in the internal network. For the second part of our attack, we use our favorite relaying tool, ntlmrelayx. This tool is part of the impacket Python library by Core Security and is an improvement on the well-known smbrelayx tool, supporting several protocols to relay to. Core Security and Fox-IT recently worked together on improving ntlmrelayx, adding several new features which (among others) enable it to relay via IPv6, serve the WPAD file, automatically detect proxy requests and prompt the victim for the correct authentication. If you want to check out some of the new features, have a look at the relay-experimental branch.

To serve the WPAD file, all we need to add to the command prompt is the host is the -wh parameter and with it specify the host that the WPAD file resides on. Since mitm6 gives us control over the DNS, any non-existing hostname in the victim network will do. To make sure ntlmrelayx listens on both IPv4 and IPv6, use the -6 parameter. The screenshots below show both tools in action, mitm6 selectively spoofing DNS replies and ntlmrelayx serving the WPAD file and then relaying authentication to other servers in the network.

NEAT.
hash  relay  ipv6  mitm  pentest  security 
10 days ago by whip_lash
google/highwayhash: Fast strong hash functions: SipHash/HighwayHash
HighwayHash: 'We have devised a new way of mixing inputs with AVX2 multiply and permute instructions. The multiplications are 32x32 -> 64 bits and therefore infeasible to reverse. Permuting equalizes the distribution of the resulting bytes. The internal state occupies four 256-bit AVX2 registers. Due to limitations of the instruction set, the registers are partitioned into two 512-bit halves that remain independent until the reduce phase. The algorithm outputs 64 bit digests or up to 256 bits at no extra cost. In addition to high throughput, the algorithm is designed for low finalization cost. The result is more than twice as fast as SipTreeHash.

We also provide an SSE4.1 version (80% as fast for large inputs and 95% as fast for short inputs), an implementation for VSX on POWER and a portable version (10% as fast). A third-party ARM implementation is referenced below.

Statistical analyses and preliminary cryptanalysis are given in https://arxiv.org/abs/1612.06257.'

(via Tony Finch)
siphash  highwayhash  via:fanf  hashing  hashes  algorithms  mac  google  hash 
11 days ago by jm
Hashids - generate short unique ids from integers
Hashids is a small open-source library that generates short, unique, non-sequential ids from numbers.

It converts numbers like 347 into strings like “yr8”, or array of numbers like [27, 986] into “3kTMd”.

You can also decode those ids back. This is useful in bundling several parameters into one or simply using them as short UIDs.
ids  database  hash  keys 
20 days ago by cdzombak

« earlier    

related tags

10  ab  address  algorithm  algorithms  anchor  apple  architecture  argon2  article  assault  asset  attack  audio  authentication  auto  bagwell  bcrypt  bestpractice  bitcoin  bitmain  bittorrent  blockchain  bloomfilter  browns  brunch  c++  c  cabbage  cache  caching  casserole  catalog  certificate  chainpoint  checksum  clojure  comparison  comparisons  consensus  consistent-hashing  consistent  content-addressable-storage  cotedazur  craft-plugin  craft  crypto  cryptocurrency  cryptography  cuckoo  cybersecurity  data  database  datastructures  db  decision  decryption  deduplication  demo  design  diff  diy  documents  egg  elegant  encoding  encrypt  equality  evaluation  ewh  exists  file  fingerprint  fnv  forensics  formats  function  generator  git  github  go  golang  google  guava  guide  hack  hacking  haha  hashes  hashing  hashmap  highwayhash  how-to  howto  id  identifier  identifiers  identity  ids  important  increment  index  information  infosec  init  inner  ip  ipv6  java  kerberos  keys  library  linkedlist  mac  management  match  math  md5  min  minhash  mining  mitm  multirelay  mushroom  named-information  near  nested  nlp  normalization  ntlm  obfuscate  object  online  open-source  opensource  openssl  os  papers  password  passwords  pentest  pentesting  perf  performance  photos  php  pki  potato  programming  pronounceable  protocol  python  random  reference  relay  responder  ruby  salt  scalability  scrypt  security  selection  sexism  sha1  sha256  simple  siphash  smb  smb2  socat  software  softwaredevelopment  sourcecode  spec  spinach  split  ssl  stamp  swift  tables  testing  tree  trie  tutorial  uid  uri  url  utilities  veg  video  visual  volatility  vs  webdev  windows  working  암호화 

Copy this bookmark:



description:


tags: