May 21, 2026
Crack Kid Chronicles
Show HN: I Dedicated 4 Years to Mastering Offline Password Cracking
Teen spent 4 years writing the ultimate password-cracking guide—and commenters are impressed but picky
TLDR: An 18-year-old published a 427-page book after spending four years learning how to break password protections for ethical security testing. Commenters were impressed by the dedication, but quickly turned into critics and coaches—questioning the video link, nitpicking the writing, and demanding deeper details.
A teenager just rolled into Hacker News with a 427-page book about breaking passwords on your own device, saying he spent four years mastering the craft and turning his notes into a full guide. And yes, the community’s first reaction was basically: wow, that’s an absurd amount of work. Several commenters were openly impressed that someone started this journey at 14, kept updating the material as the field changed, and actually finished a book before most people finish a side project.
But this is the internet, so the applause came with side-eye. One reader praised the book’s accuracy, then gently twisted the knife by saying parts felt too wordy—including a section explaining what a password is, which is the kind of feedback that sounds polite and devastating at the same time. Another mini-drama popped up over the promo video: one commenter immediately asked why it was on Google Drive instead of YouTube, which is such a classic comment-section move—less “tell me more about the book,” more “sir, explain your posting choices.”
The vibe overall was supportive, but with strong nerd energy: people wanted details on self-publishing, diagrams, and whether the book says anything new about so-called “mask attacks,” a method for guessing likely password patterns. In other words, the crowd didn’t just clap—they pulled up chairs, opened notebooks, and started grading the homework. The result? A debut that got respect, scrutiny, and a little platform-policing drama all at once.
Key Points
- •Bojta Lepenye says he spent four years, from age 14 to 18, studying offline password cracking with Hashcat and related tools.
- •He states that this work became his first book, with documentation beginning on January 18, 2022.
- •The author says he repeatedly revised the book as the field evolved, including changes caused by GPU support for Argon2 and other memory-hard password hashing algorithms.
- •He says the project was motivated in part by an authorized penetration test at his school and by the lack of a single comprehensive source on offline password cracking.
- •The book is described as covering password hashing algorithms, hash-function security properties, advanced cracking techniques, password analysis, and attack optimization, and it is available on Amazon with Kindle Unlimited access.