What is a dictionary attack? A dictionary attack is simple in theory. It is based on a simple assumption: users don’t want to or cannot memorize long, random sequences of …
What are rainbow table attacks? Rainbow table attacks are similar to dictionary attacks, but they use a rainbow table instead of a word list. Rainbow tables are pre-computed listings. Although …
This video will explore what techniques can be used to prevent rainbow table attacks. You can also refer to the previous video for more techniques to prevent these attacks. The …
This video will introduce alternatives to password authentication. Alternatives include the following: multi-factor authentication biometrics Windows Hello mTAN certificates You will learn about the advantages and disadvantages of these alternatives.
This video will describe what a keylogger attack is and explains common ways these attacks are spread. Keylogger attacks are one of the oldest forms of cyber threats. It reads …
This video explains how password spraying works and presents remedies to prevent it from happening. Password Spraying is a type of brute force attack where the attacker finds a common …
This video will define credential stuffing and explain how to prevent it from happening. Remedies that will be presented include multifactor authentication (MFA), and CAPTCHA. We’ll also explore retroactive strategies …
This video will show some exercises, now that we have covered how to generate a rainbow table. Once you go into the rainbow directory, we will use a brute force …
This video will demonstrate how to generate a rainbow table to crack 4-character passwords. We will start with cracking some easy passwords, which you can use as a basis to …
This video will discuss tools and commands used for rainbow table attacks. Tools are all derived from the Rainbowcrack suite and include rcrack and rtgen. How to set up and …
This video will demonstrate how to use rules to apply transformations and filters to word lists. You can use rules in existing word lists, or create your own custom sections, …
This video will demonstrate how to use a word list to crack a password. We will look at the rockyou.txt.gz. As you can see from the file ending, it is …
This video will further explain rainbow tables, how they work, and how a rainbow table can be used and created. Rainbow tables are not just a simple look-up table. One …
This video will discuss how to configure a tool to perform a dictionary attack. John the Ripper can be used for dictionary attacks as well. We will look at the …
This video will explore the tools and commands for brute force attacks. The tools we will cover include hashcat and John the Ripper. The reasons why one would use a …