Passwords have become the top authentication factor in today’s world. You use it in combination with an email or username to sign into almost any service. Big Corporations like Google, Microsoft, Amazon, and Facebook still widely use passwords as an authentication mechanism today. But how secure are passwords?
This course focuses on the practical attacks that malicious users use to crack passwords, how you can use this attack in a penetration test, and how you can prevent them.
We will very briefly cover the basics of cryptography, hashing and entropy and then immediately go on to crack different types of passwords using different methodologies.
Table of contents
- Chapter 1: Bypassing Your First Password
- Chapter 2: Brute Force Attacks
- Chapter 3: Dictionary Attacks
- Chapter 4: Rainbow Table Attacks
- Chapter 5: The Downside of Passwords
- Chapter 6: Remedies and Mitigations
- Chapter 7: Case Studies
- Title: Hands-On Password Attacks and Security
- Release date: October 2020
- Publisher(s): EC-Council
- ISBN: None
You might also like
Securing Your Network from Attacks
Attacks on enterprise networks and home networks are a growing problem with daily targeted attacks that …
Cybersecurity Attacks (Red Team Activity)
Learn about the different kinds of cyber attacks and how they can be executed About This …
SQL Injection Attacks: Protect Your System from Vulnerabilities
This video takes you through everything you need to understand SQL injection and how to prepare …
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …