O'Reilly logo

Penetration Testing and Network Defense by Daniel P. Newman, Andrew Whitaker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Password Cracking

Login: yes

Password: i dont have one

password is incorrect

Login: yes

Password: incorrect

Before the advent of computers, companies relied on locked doors and filing cabinets to secure their data. Physical security provided enough peace of mind for businesses to protect their corporate assets. Now, with network access to company data providing accessibility from virtually anywhere, physical security is no longer sufficient.

Thus, companies have turned to access control to protect their data. Strong access control should entail at least two of the following:

  • Something an identity knows—A pin number or password

  • Something an identity has—A SecureID card

  • Something an identity is—Biometrics

  • Something an identity does—Monitoring ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required