<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Black Hat Go on original.flipster</title><link>https://originalflipster.com/tags/black-hat-go/</link><description>Recent content in Black Hat Go on original.flipster</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026</copyright><lastBuildDate>Mon, 08 Sep 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://originalflipster.com/tags/black-hat-go/index.xml" rel="self" type="application/rss+xml"/><item><title>What's Cracking? Oh, must be your KeePass password!</title><link>https://originalflipster.com/playbooks/kdbx-keepass-password-cracking/</link><pubDate>Mon, 08 Sep 2025 00:00:00 +0000</pubDate><guid>https://originalflipster.com/playbooks/kdbx-keepass-password-cracking/</guid><description>Recently, I found myself stumbling upon a &lt;code>.kdbx&lt;/code> (KeePass Database) file as part of a backup in a CTF and needed to crack the password to gain access to the secrets contained and consequently elevate my privileges. Problem was, that I couldn&amp;rsquo;t get the hash in the right format for cracking it with &lt;code>john&lt;/code>: &lt;code>unsupported database file version (4)&lt;/code>. So, I built &lt;code>keepass-rush&lt;/code> to do so myself.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://originalflipster.com/playbooks/kdbx-keepass-password-cracking/featured.webp"/></item></channel></rss>