diff --git a/bin/setup b/bin/setup index f55ca2a614b6014ce1bace24ec16ddd33468eef2..0f5404830be64784d0580a3444e61b3617e6b588 100755 --- a/bin/setup +++ b/bin/setup @@ -3,7 +3,7 @@ DIR="$( cd "$( dirname "${BASH_SOURCE[0]:-$0}" )/.." && pwd )" if [[ ! -d "${DIR}/.venv" ]] ; then - virtualenv -p /usr/bin/python3 "${DIR}/.venv" + virtualenv -p /usr/bin/python2 "${DIR}/.venv" fi source "${DIR}/.venv/bin/activate" diff --git a/content/slides/1337/md/authentication.md b/content/slides/1337/md/authentication.md index f957bbcd6b3bc90a1aed9fe45358dc9be82fc8a3..92cb7602a028ec10af8fc2225c584ad142519ff3 100644 --- a/content/slides/1337/md/authentication.md +++ b/content/slides/1337/md/authentication.md @@ -316,7 +316,6 @@ Note: * [John the Ripper](http://www.openwall.com/john/) permet de générer des mots de passes dérivant de parties du username -<!-- ## [THC Hydra](http://www.thc.org/thc-hydra/) * multi-protocole: IMAP, SMB, HTTP, VNC, MS-SQL MySQL, SMTP, SSH, VNC, Asterisk, ... @@ -377,14 +376,13 @@ unshadow /etc/passwd /etc/shadow > mypasswd ## attaques par tables arc-en-ciel -* [Project RainbowCrack](http://www.antsight.com/zsl/rainbowcrack/) * [CrackStation](https://crackstation.net/) * avec la signature de smithy dans la table user ```shell 5f4dcc3b5aa765d61d8327deb882cf99 ``` ---> + ## <i class="fa fa-medkit"></i> Se protéger diff --git a/plugins/i18n_subsites/__init__.pyc b/plugins/i18n_subsites/__init__.pyc index b3481921b54499b7a32fa2b4b88aec6e33028e8f..4e4d242fd150b546379306b3c3468e9b0b5254c4 100644 Binary files a/plugins/i18n_subsites/__init__.pyc and b/plugins/i18n_subsites/__init__.pyc differ diff --git a/plugins/i18n_subsites/i18n_subsites.pyc b/plugins/i18n_subsites/i18n_subsites.pyc index 6762fa8cc69f61a17771c57b7767bf22d31f404a..0d52ca50ba28f189b25776769e583740828da146 100644 Binary files a/plugins/i18n_subsites/i18n_subsites.pyc and b/plugins/i18n_subsites/i18n_subsites.pyc differ