by Immanuel Willi

Almost weekly, we see news about spectacular “breaches” in which cybercriminals steal vast amounts of user data, such as user names, e-mail addresses and password hashes. Unfortunately, it is usually not mentioned which hash function was used to protect the passwords – given that the strength of a hash function decides whether the password hashes can be converted to plaintext passwords with a lot of or virtually no effort.

In this workshop, participants will learn many new things about hashes, hash functions and smart cracking approaches. A seemingly complex subject will be explained from the ground up.

Further information and registration: