New Results in Password Hash Reversal

New Results in Password Hash Reversal

via YouTube Direct link

We can pretend

15 of 40

15 of 40

We can pretend

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

New Results in Password Hash Reversal

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Who am I
  3. 3 The Ashley Madison leak
  4. 4 Password management policies
  5. 5 Definitions
  6. 6 How hashes work
  7. 7 Cryptographic hashes
  8. 8 Examples of hash functions
  9. 9 Hash is oneway functions
  10. 10 Password space
  11. 11 Collisions
  12. 12 Google announcement
  13. 13 How servers store passwords
  14. 14 Logins work
  15. 15 We can pretend
  16. 16 Bruteforcing
  17. 17 Permutation
  18. 18 Parallel lines
  19. 19 Rainbow tables
  20. 20 Reduction function
  21. 21 Rainbow table
  22. 22 Rainbow table example
  23. 23 Rainbow table downsides
  24. 24 Worst case
  25. 25 Sequence of reduction
  26. 26 New idea
  27. 27 What hash function does
  28. 28 What if we track regions
  29. 29 A few more definitions
  30. 30 Some more examples
  31. 31 What does this mean
  32. 32 Storing the digest
  33. 33 Groovy technology
  34. 34 Spacetime tradeoffs
  35. 35 Data structure
  36. 36 Hash functions
  37. 37 Bloom filters
  38. 38 Bloom reverse system
  39. 39 Brute force
  40. 40 Example

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.