000 01570cam  2200313za 4500
0019.858201
003CaOODSP
00520221107155933
007cr |||||||||||
008180627s2018    onca   #o    f000 0 eng d
040 |aCaOODSP|beng
043 |an-cn---
0861 |aD68-10/25-2018E-PDF
1001 |aCarbone, Richard.
24510|aWordlist password cracking using John the Ripper |h[electronic resource] : |ba tutorial and lessons learned for heterogeneous clusters / |cRichard Carbone.
260 |aOttawa : |bDefence Research and Development Canada, |c2018.
300 |a[11] p. : |bill.
4901 |aExternal literature (P) ; |vDRDC-RDDC-2018-P025
500 |aTitle from cover.
500 |a"Can unclassified."
500 |a"March 2018."
500 |aOriginally published in: Digital Forensics Magazine, Issue 34, Pages 64-69, February 2018.
520 |a"Recently, I needed to recover a passphrase from a retired Linux system to mount a TrueCrypt (TC) volume on that very same disk. At the same time, I had forgotten the passphrase to a more recent EncFS volume. I wrote this article to share my experiences using the John the Ripper (JtR) password cracker atop a small heterogeneous cluster"--p. 64.
693 4|aPassword cracking
693 4|aWordlists
693 4|aJohn the Ripper
7101 |aCanada. |bDefence R&D Canada.
830#0|aExternal literature (P) (Defence R&D Canada)|vDRDC-RDDC-2018-P025.|w(CaOODSP)9.854437
85640|qPDF|s1.18 MB|uhttps://publications.gc.ca/collections/collection_2018/rddc-drdc/D68-10-25-2018-eng.pdf