Exploiting weak encryption to steal credentials

Encryption plays is a key role in our daily lives; whether we are checking our emails on the go, browsing a favorite website, or simply sending a message to a friend, data encryption provides us with an acceptable level of privacy from prying eyes. Quite often, IT professionals don't always keep track of their compliance levels in maintaining encryption techniques to secure data on a system. This leads to a malicious user or hacker compromising a vulnerable system to retrieve confidential data due to poor encryption practices.

In this exercise, we will attempt to discover one of the most common vulnerabilities in encryption on a target. Once found, we will then exploit the weak encryption vulnerability. ...

Get Learn Kali Linux 2019 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.