| 000 | 00000nam 2200000za 4500 |
| 001 | 9.858201 |
| 003 | CaOODSP |
| 005 | 20240219183504 |
| 007 | cr ||||||||||| |
| 008 | 180627s2018 onca #o f000 0 eng d |
| 040 | |aCaOODSP|beng |
| 043 | |an-cn--- |
| 086 | 1 |aD68-10/25-2018E-PDF |
| 100 | 1 |aCarbone, Richard. |
| 245 | 10|aWordlist password cracking using John the Ripper |h[electronic resource] : |ba tutorial and lessons learned for heterogeneous clusters / |cRichard Carbone. |
| 260 | |aOttawa : |bDefence Research and Development Canada, |c2018. |
| 300 | |a[11] p. : |bill. |
| 490 | 1 |aExternal literature (P) ; |vDRDC-RDDC-2018-P025 |
| 500 | |aTitle from cover. |
| 500 | |a"Can unclassified." |
| 500 | |a"March 2018." |
| 500 | |aOriginally published in: Digital Forensics Magazine, Issue 34, Pages 64-69, February 2018. |
| 520 | |a"Recently, I needed to recover a passphrase from a retired Linux system to mount a TrueCrypt (TC) volume on that very same disk. At the same time, I had forgotten the passphrase to a more recent EncFS volume. I wrote this article to share my experiences using the John the Ripper (JtR) password cracker atop a small heterogeneous cluster"--p. 64. |
| 693 | 4|aPassword cracking |
| 693 | 4|aWordlists |
| 693 | 4|aJohn the Ripper |
| 710 | 2 |aDefence R&D Canada. |
| 830 | #0|aExternal literature (P) (Defence R&D Canada)|vDRDC-RDDC-2018-P025.|w(CaOODSP)9.854437 |
| 856 | 40|qPDF|s1.18 MB|uhttps://publications.gc.ca/collections/collection_2018/rddc-drdc/D68-10-25-2018-eng.pdf |