Radek Hranický
YOU?
Author Swipe
View article: Phishing and Benign Domain Dataset (DNS, IP, WHOIS/RDAP, TLS, GeoIP)
Phishing and Benign Domain Dataset (DNS, IP, WHOIS/RDAP, TLS, GeoIP) Open
The dataset contains DNS records, IP-related features, WHOIS/RDAP information, information from TLS certificate fields, and GeoIP information for 432,572 verified benign domains from Cisco Umbrella and 36,993 verified phishing domains from…
View article: Phishing and Benign Domain Dataset (DNS, IP, WHOIS/RDAP, TLS, GeoIP)
Phishing and Benign Domain Dataset (DNS, IP, WHOIS/RDAP, TLS, GeoIP) Open
The dataset contains DNS records, IP-related features, WHOIS/RDAP information, information from TLS certificate fields, and GeoIP information for 432,572 verified benign domains from Cisco Umbrella and 36,993 verified phishing domains from…
View article: JShelter: Give Me My Browser Back
JShelter: Give Me My Browser Back Open
The web is used daily by billions. Even so, users are not protected from many threats by default. This position paper builds on previous web privacy and security research and introduces JShelter, a webextension that fights to return the br…
View article: What do incident response practitioners need to know? A skillmap for the years ahead
What do incident response practitioners need to know? A skillmap for the years ahead Open
Digital forensics incident response (DFIR) specialists are expected to possess multidisciplinary skills including expert knowledge of computer-related principles and technology. On the other hand, recent studies suggest that existing train…
View article: Data for: Distributed password cracking with BOINC and hashcat
Data for: Distributed password cracking with BOINC and hashcat Open
Experimental results of distributed dictionary attack using Fitcrack and Hashtopolis + used passwords and hashes Experimental results of distributed brute-force attack using Fitcrack and Hashtopolis + used passwords and hashes Benchmarking…
View article: On Efficiency of Distributed Password Recovery
On Efficiency of Distributed Password Recovery Open
One of the major challenges in digital forensics today is data encryption. Due to the leaked information about unlawful sniffing, many users decided to protect their data by encryption. In case of criminal activities, forensic experts are …