Discover which cryptographic techniques are used to protect passwords. In this video, Lisa Bock discusses some of the ways black-hat hackers are able to determine a user password. Learn about hashing, a cryptographic technique for obscuring plain text password. Explore rainbow table, and ways to reverse lookup a hashed value.
- [Voiceover] Password management is used by…an operating system to protect the integrity…and confidentiality of the passwords in the system.…In most cases, the hash of the password is generated,…and then stored in a file.…The password is discarded.…But let's talk about hashing and cryptographic functions.…We'll talk about encryption versus hashing.…Encryption uses a key, or pair of keys.…When we encrypt a message with a key,…we can decrypt the message as long as we have the key.…
In this example showing symmetric encryption,…we see the plaintext,…the shared secret,…the encryption algorithm,…and that becomes cyphertext.…To decrypt, we take the cyphertext,…the same shared key, and encryption algorithm,…and that converts back to plain text.…However, hashing is a one way cryptographic function.…You cannot generate the original message from the hash.…
We use a hash value in a number of different applications.…Including authenticating a message,…monitoring data integrity,…and storing passwords.…There are several hash algorithms,…
These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Acquiring passwords
- Generating rainbow tables
- Understanding where passwords are stored
- Defending against privilege escalation
- Understanding spyware
- Protecting against keylogging
- Detecting steganography
- How hackers cover their tracks
Skill Level Intermediate
1. System Hacking Overview
2. Gaining Access
3. Privilege Escalation
6. Hiding in Plain Sight
7. Cover Your Tracks
How to cover your tracks2m 34s
Next steps1m 2s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.