[Chapter 2a] Cryptography II + Hash Functions & Wordlists

Cryptography has been used to protect the confidentiality, integrity and authenticity of data for years. MIA discovered more than what she has anticipated. S...

Avocado5.9K views02:16:21

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Pakistan under the topic 'f'.

About this video

Cryptography has been used to protect the confidentiality, integrity and authenticity of data for years. MIA discovered more than what she has anticipated. She found that most passwords are masked with some kind of hashes. These hashes are what kept the passwords safe. But that's all about to change as the evil BOTS that are designed to crack these sacred passwords. In this chapter, we help MIA to learn the way the evil BOT crack passwords using JOHN the ripper and Hydra; so that she can lay out her own countermeasures. Download Slides: https://tryhackme.com/room/passwordscracking #hydra #john #johntheripper #passwords #cybersecurity #crack #hack #crunch #hash #wordlists 0:00 Intro 10:36 Substitution Cipher 30:53 Hill Cipher 47:50 RSA 1:03:52 Digital Signatures 1:39:00 Authentication Methods 1:40:57 Passwords 1:49:48 Hash Functions 2:00:00 Rainbow Table 2:04:05 Problem 1- different usernames, same passwords=same hash 2:08:59 Problem 2 - Hash collision - different passwords but same hash digest

Video Information

Views
5.9K

Total views since publication

Likes
73

User likes and reactions

Duration
02:16:21

Video length

Published
Oct 25, 2022

Release date

Quality
hd

Video definition

About the Channel