Cryptography II: Unlocking the Secrets of Hash Functions & Wordlists 🔐
Explore advanced cryptography concepts, including hash functions and wordlists, and learn how they safeguard data integrity, confidentiality, and authenticity. Discover insights beyond the basics in this engaging chapter!

Avocado
5.9K views • Oct 25, 2022

About this video
Cryptography has been used to protect the confidentiality, integrity and authenticity of data for years. MIA discovered more than what she has anticipated. She found that most passwords are masked with some kind of hashes. These hashes are what kept the passwords safe. But that's all about to change as the evil BOTS that are designed to crack these sacred passwords. In this chapter, we help MIA to learn the way the evil BOT crack passwords using JOHN the ripper and Hydra; so that she can lay out her own countermeasures.
Download Slides: https://tryhackme.com/room/passwordscracking
#hydra
#john
#johntheripper
#passwords
#cybersecurity
#crack
#hack
#crunch
#hash
#wordlists
0:00 Intro
10:36 Substitution Cipher
30:53 Hill Cipher
47:50 RSA
1:03:52 Digital Signatures
1:39:00 Authentication Methods
1:40:57 Passwords
1:49:48 Hash Functions
2:00:00 Rainbow Table
2:04:05 Problem 1- different usernames, same passwords=same hash
2:08:59 Problem 2 - Hash collision - different passwords but same hash digest
Download Slides: https://tryhackme.com/room/passwordscracking
#hydra
#john
#johntheripper
#passwords
#cybersecurity
#crack
#hack
#crunch
#hash
#wordlists
0:00 Intro
10:36 Substitution Cipher
30:53 Hill Cipher
47:50 RSA
1:03:52 Digital Signatures
1:39:00 Authentication Methods
1:40:57 Passwords
1:49:48 Hash Functions
2:00:00 Rainbow Table
2:04:05 Problem 1- different usernames, same passwords=same hash
2:08:59 Problem 2 - Hash collision - different passwords but same hash digest
Video Information
Views
5.9K
Likes
73
Duration
02:16:21
Published
Oct 25, 2022
User Reviews
4.4
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.