Discover which cryptographic techniques are used to protect passwords. In this video, Lisa Bock discusses some of the ways black-hat hackers are able to determine a user password. Learn about hashing, a cryptographic technique for obscuring plain text password. Explore rainbow table, and ways to reverse lookup a hashed value.
- View Offline
- [Voiceover] Password management is used by…an operating system to protect the integrity…and confidentiality of the passwords in the system.…In most cases, the hash of the password is generated,…and then stored in a file.…The password is discarded.…But let's talk about hashing and cryptographic functions.…We'll talk about encryption versus hashing.…Encryption uses a key, or pair of keys.…When we encrypt a message with a key,…we can decrypt the message as long as we have the key.…
In this example showing symmetric encryption,…we see the plaintext,…the shared secret,…the encryption algorithm,…and that becomes cyphertext.…To decrypt, we take the cyphertext,…the same shared key, and encryption algorithm,…and that converts back to plain text.…However, hashing is a one way cryptographic function.…You cannot generate the original message from the hash.…
We use a hash value in a number of different applications.…Including authenticating a message,…monitoring data integrity,…and storing passwords.…There are several hash algorithms,…
These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Acquiring passwords
- Generating rainbow tables
- Understanding where passwords are stored
- Defending against privilege escalation
- Understanding spyware
- Protecting against keylogging
- Detecting steganography
- How hackers cover their tracks