In most cases, to gain access into a system, users must provide some type of authentication. Lisa Bock explores how modern systems authenticate user login information. Dive into the details of Kerberos, Pluggable Authentication Modules (PAM), along with Simple Authentication and Security Layer (SASL).
- [Voiceover] In most cases, to gain access into a system,…we must provide some type of authentication.…Microsoft has a proprietary authentication protocol called…New Technology LAN Manager which operates within Explorer.…New Technology LAN Manager uses a challenge response…which is an authentication method where an entity presents…a question, or challenge, and another entity must deliver…a valid response in order to be authenticated.…
Kerberos is built into Active Directory, and uses tickets…to access services.…User accounts and passwords are on the Domain Controller…which acts as the Kerberos Key Distribution Center…and Active Directory as it's account database.…The Key Distribution Center is a single process…that provides two services.…Authentication Service to get authenticated, and a Ticket…Granting Service to obtain a ticket for services.…
When a user needs access to services on the network,…they must first go to the Key Distribution Center…which then hits the Authentication Servers first.…Then, once authenticated, it will go to the Ticket…
These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Acquiring passwords
- Generating rainbow tables
- Understanding where passwords are stored
- Defending against privilege escalation
- Understanding spyware
- Protecting against keylogging
- Detecting steganography
- How hackers cover their tracks
Skill Level Intermediate
1. System Hacking Overview
2. Gaining Access
3. Privilege Escalation
6. Hiding in Plain Sight
7. Cover Your Tracks
How to cover your tracks2m 34s
Next steps1m 2s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.