NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - General Discussion - Crack Me If You Can 2019 statistics - annual password cracking contest sponsored by KoreLogic


3 Results - Page 1 of 1 -
1
Author Message
Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 3751
Team:
Reputation: 10547 Reputation
Online
Tue, 06 Aug 2019 @ 11:50:32

CMIYC is returning to DEF CON in 2019!

What: The premier annual password cracking contest sponsored by KoreLogic.
Where: DEF CON 27 - Las Vegas, NV, USA, and over the Internet.
When: 48 hours, from 10 PM Las Vegas time (US/Pacific) Thursday, August 8th, 2019 to 10 PM LV time Saturday, August 10th.
Who: Anyone can play. Teams of people will do best.
Why: To help push the envelope of password cracking techniques/ methodologies and to challenge password crackers' skills.
Winning: The team with the most points, wins.


XMPP: freeroute@xmpp.jp
General rules | Paid section rules

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 3751
Team:
Reputation: 10547 Reputation
Online
Sat, 10 Aug 2019 @ 14:06:58

This scoreboard table shows the stats for each team; see below forexplanations. This table is refreshed about every five minutes.

Updates: Watch this site and @CrackMeIfYouCan for updates.


XMPP: freeroute@xmpp.jp
General rules | Paid section rules

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 3751
Team:
Reputation: 10547 Reputation
Online
Sun, 25 Aug 2019 @ 09:47:19

CMIYC 2019 Hashes and Plaintexts

"All of the hashes this year were django-scrypt format - painfully slow to attack head-on (slower for Pro than for Street). Every plaintext was tied to a specific username, and each username also occurred in some hint/challenge file. All of the challenge files combined a few elements:

1. Something simple to open it up (password like "password", or just strings or base64 -d the file, etc.).

2. Some notes/hint/email text that gave information about the tricks used in that set.

3. Some username:hash data using a weak hash type. Once those weak hashes were cracked, the plaintexts were an effective dictionary against those same usernames' real django-scrypt hashes."

Full story: https://contest-2019.korelogic.com/stats-hashsets.html


XMPP: freeroute@xmpp.jp
General rules | Paid section rules


3 Results - Page 1 of 1 -
1

We have a total of 216803 messages in 26508 topics.
We have a total of 23386 registered users.
Our newest registered member is buddyrich.