What is a dictionary attack? A dictionary attack is simple in theory. It is based on a simple assumption: users don’t want to or cannot memorize long, random sequences of …
What are rainbow table attacks? Rainbow table attacks are similar to dictionary attacks, but they use a rainbow table instead of a word list. Rainbow tables are pre-computed listings. Although …
This video will explore what techniques can be used to prevent rainbow table attacks. You can also refer to the previous video for more techniques to prevent these attacks. The …
This video will introduce alternatives to password authentication. Alternatives include the following: multi-factor authentication biometrics Windows Hello mTAN certificates You will learn about the advantages and disadvantages of these alternatives.
This video explains how password spraying works and presents remedies to prevent it from happening. Password Spraying is a type of brute force attack where the attacker finds a common …
This video will describe what a keylogger attack is and explains common ways these attacks are spread. Keylogger attacks are one of the oldest forms of cyber threats. It reads …
This video will define credential stuffing and explain how to prevent it from happening. Remedies that will be presented include multifactor authentication (MFA), and CAPTCHA. We’ll also explore retroactive strategies …
This video will show some exercises, now that we have covered how to generate a rainbow table. Once you go into the rainbow directory, we will use a brute force …
This video will demonstrate how to generate a rainbow table to crack 4-character passwords. We will start with cracking some easy passwords, which you can use as a basis to …
This video will demonstrate how to use rules to apply transformations and filters to word lists. You can use rules in existing word lists, or create your own custom sections, …
This video will discuss tools and commands used for rainbow table attacks. Tools are all derived from the Rainbowcrack suite and include rcrack and rtgen. How to set up and …
This video will demonstrate how to use a word list to crack a password. We will look at the rockyou.txt.gz. As you can see from the file ending, it is …
This video will further explain rainbow tables, how they work, and how a rainbow table can be used and created. Rainbow tables are not just a simple look-up table. One …
This video will discuss how to configure a tool to perform a dictionary attack. John the Ripper can be used for dictionary attacks as well. We will look at the …
This video will explore the tools and commands for brute force attacks. The tools we will cover include hashcat and John the Ripper. The reasons why one would use a …