Jump to content

Search the Community

Showing results for tags 'machine'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Enter a five letter word.

Found 2 results

  1. Hi all, I can search this question on the internet and find the occasional useful byte of information, but most of it's a bit rubbish. Plus, I'd like to get some direct opinions. How would you personally go about setting up an affordable (say, less than $1500) Password hash cracking machine? For example; A computer packed with loads of cheap GPUs? But which ones? A Raspberry Pi cluster? Pay a service to do it for you? If so, what services are available? Other? Thanks. *edited* My spelling and grammar is always terrible because I type too fast.
  2. This article provides a step by step approach from ground up to devising your own malware classifier using machine learning fundamentals. Naive Bayes Rule, statistics and ranking algos. This is more like AV - Heuristics and other methods that dont have to depend exclusively on signatures, which are little more than file specific fingerprints based on byte pattern hashes or format anomalies that are boiled down to a detection checklist. However, this is still not a 100 percent perfected method though enougl calibration will certainly provide a workable and reliable enough engine. This discussion should encourage you to build your own variations and share their results Link 1 : http://resources.infosecinstitute.com/machine-learning-naive-bayes-rule-for-malware-detection-and-classification/ Link 2 : http://resources.infosecinstitute.com/naive-bayes-rule-building-your-own-malware-classifier-ii/ Link 3 : http://resources.infosecinstitute.com/machine-learning-part-3-ranking/
  • Create New...