Passwords have become the top authentication factor in today’s world. You use it in combination with an email or username to sign into almost any service. Big Corporations like Google, Microsoft, Amazon, and Facebook still widely use passwords as an authentication mechanism today. But how secure are passwords?
This course focuses on the practical attacks that malicious users use to crack passwords, how you can use this attack in a penetration test, and how you can prevent them.
We will very briefly cover the basics of cryptography, hashing and entropy and then immediately go on to crack different types of passwords using different methodologies.
Table of contents
- Chapter 1: Bypassing Your First Password
- Chapter 2: Brute Force Attacks
- Chapter 3: Dictionary Attacks
- Chapter 4: Rainbow Table Attacks
- Chapter 5: The Downside of Passwords
- Chapter 6: Remedies and Mitigations
- Chapter 7: Case Studies
- Title: Hands-On Password Attacks and Security
- Release date: October 2020
- Publisher(s): EC-Council
- ISBN: None
You might also like
Clean Code: A Handbook of Agile Software Craftsmanship
Even bad code can function. But if code isn't clean, it can bring a development organization …
51+ hours of video instruction. Overview The professional programmer’s Deitel® video guide to Python development with …
Building Microservices, 2nd Edition
Distributed systems have become more fine-grained as organizations shift from code-heavy monolithic applications to smaller, self-contained …
Head First Design Patterns, 2nd Edition
You know you don’t want to reinvent the wheel, so you look to design patterns—the lessons …