Optimizing the Computation of Hash Algorithms as an Attacker

atom

Details are presented that explain how Hashcat optimizes the computation of MD5, NTLM, SHA1, PBKDF2 etc.

Most hash algorithms are designed to generate digests of large data inputs, but many developers use them to store passwords. By doing this, all hash algorithms can be optimized in some way to compute the hashes for password cracking; some more, some less.

I'll show some general optimization techniques and how they are used in Hashcat, which is what makes Hashcat fast.

Presented by