Completed
Why hash
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Your Users Passwords Are Already Stolen
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Who am I
- 3 All passwords are crap
- 4 Threat actor perspective
- 5 Attack life cycle
- 6 They pivot
- 7 Password reuse
- 8 Phishing schemes
- 9 Why hash
- 10 MD5 is broken
- 11 Keyspace
- 12 Salt
- 13 Rounds
- 14 Implementation failures
- 15 Database breaches
- 16 Zappos
- 17 Cracking User Databases
- 18 Creating a Word List
- 19 Performance
- 20 Database Leak
- 21 DHS Critical Infrastructure
- 22 Results
- 23 Takeaways
- 24 Rapid Detection Response Model
- 25 Insider Threat Perspective
- 26 Questions