Explore the many techniques malicious parties use to acquire passwords. Lisa discusses the three ways users authenticate on most networks, biometrics, passwords, and physical tokens. Learn some of the best tips for securing your system, to keep black-hat hackers at bay. Understand how and where systems store user information and passwords.
- [Lisa] Authentication is proving your identity,…like presenting your driver's license…to the teller at the bank…when you wanna cash a check.…However, in a computing environment…user authentication on the network…can be done in one of three ways,…what you know in the form of a password,…what you are in the form of a biometric…such as a fingerprint or facial recognition,…or what you have such as a smart card.…Although there are choices, authentication is commonly done…in the form of a username and password.…
Passwords are still widely used…because they're cheap and easily enforceable.…System hacking starts most of the time…with attempting to obtain the password.…When conducting ethical hacking,…it's important to know where the passwords are stored…in a system.…In Microsoft, users' password are stored…in the Security Account Manager or SAM database…in a hashed format.…And these can be found in this folder…which is in the SystemRoot/system32 folder,…which by default is accessible…only with administrative privileges…
These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Acquiring passwords
- Generating rainbow tables
- Understanding where passwords are stored
- Defending against privilege escalation
- Understanding spyware
- Protecting against keylogging
- Detecting steganography
- How hackers cover their tracks
Skill Level Intermediate
1. System Hacking Overview
2. Gaining Access
3. Privilege Escalation
6. Hiding in Plain Sight
7. Cover Your Tracks
How to cover your tracks2m 34s
Next steps1m 2s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.