raphman

Thanks for sharing. This looks interesting. Impressive achievement.

This book is currently not really relevant for me, so I just skimmed the samples on Amazon. I found the technical content to be reasonably accurate and interesting although sometimes a little bit verbose (e.g., the section about 'what is a password') or slightly imprecise. In general, I think this book might have benefited from a thorough copyediting pass. There are quite a few grammar errors and unpolished sentences in the book, e.g.:

> The reason why Linux is imperative is that well, for one, most of the tools we will use, while indeed have builds for other systems, like Windows, in this book we will work with Linux.

Wishing you success and keep on writing!

show comments
eigenrick

This is an amazing achievement for someone of any age, but to publish a book with this much research at 18 is phenomenal. I heartily congratulate you.

I've hopped through the book and it seems carefully laid out and organized. I may come back at you with questions once I've read further. Cheers.

mmastrac

I've got an old datacenter KVM with a root password I've been unable to crack, even though it's an ancient DES one.

Does anyone have a good cloud-hosted password cracker? I can't seem to brute force it, no matter how long I let John the ripper run.

ViAchKoN

Nice job! It is a massive achievement to publish a book let alone to be start a career so early at age! Now need to find time read the book. It seems it be quite interesting.

aqsa_sajjad

This is a really impressive project, especially starting at 14. The point about there being no single comprehensive resource rings true, I've tried to learn about password security before and always ended up jumping between five different tabs just to understand one concept.

amelius

Ok, so what should we use instead of passwords?

show comments
gabrielsroka

Great job. The book is 427 pages.

Why not put the video on YouTube?

show comments
andai

Congratulations! The book looks great.

I would love to hear more about the process of writing and preparing it for publishing. It's self-published? How did you do the typesetting and the diagrams?

show comments
sijmen

Congratulate on finishing such a big project on a complicated topic, and putting in all this effort so that others can learn as well. I enjoyed reading the first few pages on Amazon

Footprint0521

The video url is down? This sounds super interesting!

nilirl

I love the book cover! Great job, Bojta.

kelsey98765431

can you discuss your coverage of password mask attacks, specifically is there any advances since EBM

paulpauper

relevant https://en.wikipedia.org/wiki/2022_LastPass_data_breach

probably a lot of ppl lost crypto this way.

show comments
latchkey

when i was running 150k amd gpus... i really wanted to use the cluster to run hashcat to help people recover lost things. i couldn't convince management that that was a profitable business to run.

show comments
saberience

There’s a reason there are no books about this, because most people are not interested in cracking local/offline passwords.

In fact, the people most interested in password cracking are usually criminals.

But good luck with the book. It’s just not a hugely in demand topic.

show comments