Need help?
<- Back

Comments (23)

  • raphman
    Thanks for sharing. This looks interesting. Impressive achievement.This book is currently not really relevant for me, so I just skimmed the samples on Amazon. I found the technical content to be reasonably accurate and interesting although sometimes a little bit verbose (e.g., the section about 'what is a password') or slightly imprecise. In general, I think this book might have benefited from a thorough copyediting pass. There are quite a few grammar errors and unpolished sentences in the book, e.g.:> The reason why Linux is imperative is that well, for one, most of the tools we will use, while indeed have builds for other systems, like Windows, in this book we will work with Linux.Wishing you success and keep on writing!
  • eigenrick
    This is an amazing achievement for someone of any age, but to publish a book with this much research at 18 is phenomenal. I heartily congratulate you.I've hopped through the book and it seems carefully laid out and organized. I may come back at you with questions once I've read further. Cheers.
  • gabrielsroka
    Great job. The book is 427 pages.Why not put the video on YouTube?
  • nilirl
    I love the book cover! Great job, Bojta.
  • Footprint0521
    The video url is down? This sounds super interesting!
  • andai
    Congratulations! The book looks great.I would love to hear more about the process of writing and preparing it for publishing. It's self-published? How did you do the typesetting and the diagrams?
  • sijmen
    Congratulate on finishing such a big project on a complicated topic, and putting in all this effort so that others can learn as well. I enjoyed reading the first few pages on Amazon
  • paulpauper
    relevant https://en.wikipedia.org/wiki/2022_LastPass_data_breachprobably a lot of ppl lost crypto this way.
  • kelsey98765431
    can you discuss your coverage of password mask attacks, specifically is there any advances since EBM
  • latchkey
    when i was running 150k amd gpus... i really wanted to use the cluster to run hashcat to help people recover lost things. i couldn't convince management that that was a profitable business to run.
  • saberience
    There’s a reason there are no books about this, because most people are not interested in cracking local/offline passwords.In fact, the people most interested in password cracking are usually criminals.But good luck with the book. It’s just not a hugely in demand topic.