1. Is it safe to check password against the HIBP Pwned Passwords API during account registration?

  2. John the Ripper fails with wordlist

  3. Why add username to salt before hashing a password?
  4. Which is the correct algorithm while checksumming a portion of code?
  5. Login details security using salt and hash, and a login role in postgresql

  6. How do I extract a hash from an encrypted VeraCrypt file using SHA-512

  7. When encrypting individual files in directory for cloud storage, is storing IV and salt with the file wrong?

  8. Get Hash from OS X-Encrypted USB Drive?

  9. What are the recommended scrypt cost factors for 2016?

  10. Secure preshared key 2 way authentication
  11. Cracking a MD5 hash from numerical input
  12. Securing hotspot with maintaining Deep packet ─░nspection

  13. How to create custom rule in John the Ripper

  14. Why do people still use/recommend MD5 if it has been cracked since 1996?
  15. Is hashing the concatenation of my password and account type secure?

  16. Thought Exercise for Rainbow Table Size
  17. How does the attacker know what algorithm and salt to use in a dictionary attack?

  18. What role do hashing and block ciphers play in random number generation?

  19. Do I need to hash or encrypt API keys before storing them in a database?

  20. Need advices on API key & secret generation?

  21. Email in database security vs performance
  22. Security of my homebrew hash algorithm

  23. Encrypting IP addresses in a MySQL database
  24. How to separate storing sensitive data and hash passwords?
  25. Do HP ProCurve 1810G Config files have password hashes or other sensitive info?

  26. Would it be okay to check only a part of a hash value
  27. Why does Windows still use a weak hashing algorthim to protect passwords?
  28. Why would a password be hashed before being used to encrypt something?

  29. Visual verification of DH parameter hashes vs derived password hashes

  30. What hashes does responder capture?

  31. hashing API key with a timestamp?

  32. How far should I go in protecting a user's SMBIOS UUID?

  33. Safety of barcode checksums
  34. Is there an open-source PGP that Encrypts-then-MACs, uses Blake2 or Whirlpool, and none of the NIST curves known to be compromised?

  35. Hashing a large file on an embedded system

  36. Is using 100,000 iterations of sha256 good enough for password storage?
  37. is it secure to use sha256 to hash 64 cryptographically random byte data with 12 byte salt?
  38. OpenLDAP security SSHA

  39. Is it ok to use 6 as a cost of bcrypt algortihm for 64 chars string?

  40. Using PBKDF2 for hash and AES key generation implementation

  41. How can I check the integrity of a Bitcoin tarball with GPG?

  42. If hash values are same, they lessen security. Why?
  43. Parameters for PBKDF2 for password hashing
  44. BLAKE2b 256 or 512?
  45. if salt stored in user, will it be possible to use brute force attack?
  46. How secure is the SRP that Blizzard uses to protect passwords?
  47. How do I convert from this weird John/Asleap format to lc (for HashCat)?

  48. Hash variation - .vc and string format?

  49. Is salting a hash really as secure as common knowledge implies?

  50. Is it possible to crack any MD5 hashes (without salt)?

  51. Does client side hashing add any benefit here?
  52. Using the index of characters in a security question
  53. Does prepending a salt to the password instead of inserting it in the middle decrease security?
  54. Password hashes with large internal state
  55. Why is client-side hashing of a password so uncommon?

  56. Does Facebook store plain-text passwords?

  57. How does hashcat figure out the SHA CRYPT ROUNDS on a Linux password

  58. Cracking Mysql 5 Hash using Hashcat

  59. Line Length Exception in hashcat
  60. Password Security and ocl-Hashcat-plus

  61. Is it safe to use SHA-512 to identify credit card?
  62. Is it security if an alternative of the full credit card number is stored in database

  63. Where are hash functions in the code of online forms?
  64. The optimal settings of Winrtgen GUI

  65. Login: password hash vs successful decrypt

  66. Can someone explain the weird treatment of the OpenSSL AES-256-GCM authentication tag in PHP 7.1?
  67. Is it possible to crack hash with known salt? If yes how?

  68. Identifying documents by hash: what are the security implications?

  69. My ISP shows my WiFi password on their public site in plain text. Should I be worried?

  70. Reversing a block hash of SHA-1 with known Plaintext?

  71. Security tokens for external exposure: UUID or HMAC/JWT/hash?

  72. User identity anonymization

  73. Alternative of etc/passwd for windows based server

  74. Does hashdump also dump domain creds when run on a domain controller

  75. Salted hashes vs HMAC?

  76. How can I extract the hash inside an encrypted PDF file?
  77. Using 128-bits as an input for hashing using SHAKE-3 (128-output)

  78. Encryption using best practices
  79. How does salt make a password secure against dictionary attacks
  80. Why is salt+nonce authentification over insecure channel vunrable to man-in-the-middle attack?

  81. is the hash of a hash of a password, equally or more safe than hashing just once?

  82. Determine encryption with 3 parameters provided
  83. Pip verify packet integrity

  84. Why should I hash passwords?

  85. Benefits to client-side password hashing on top of other security mechanisms

  86. Using passwords made of words

  87. How to store salt?

  88. Why do salts for hashing passwords need to be globally unique, not just system/site-unique?
  89. What are the differences between MD5, SHA and RSA?
  90. Why am I unable to capture LM & LMHASH?

  91. Why does Keybase sign hashes of previous proofs?

  92. SHA, RSA and the relation between them

  93. PTH & Salted Passwords
  94. Is salting a hash more secure than encrypting it?

  95. Does a completely random string produce a completely random hash
  96. Is this a secure way of storing passwords?

  97. Double hashing passwords between Java microservices to increase security?
  98. Do I must require Authentication for resources with an Hash-key?
  99. Seeking Review for Authentication and Message Encryption Approach

  100. Publish a PDF on a website with MD5 Hash