Главная страница


Смотреть ОНЛАЙН

This is How Hackers Crack Passwords!




Формат Размер Скачать

Информация о видео This is How Hackers Crack Passwords!


Название :  This is How Hackers Crack Passwords!
Продолжительность :   344
Пользователь :  Tech Raj
Дата публикации :   2018-05-08
Просмотры :   8,398,112
Понравилось :   162
Не понравилось :   8


Кадры из видео This is How Hackers Crack Passwords!






Описание к видео This is How Hackers Crack Passwords!

In this video, we'll see how hackers really crack passwords.

This video is edited with Filmora video editor, get it here : RtmNC5

DISCLAIMER : This video is intended only to educate people about how hackers crack passwords, and how important the strength of the password is, when coming to security.

If you are using a common password like test123456 which I used in the video, then the hacker will easily be able to know the plain text form of your password from the hash string. There is something known as Rainbow tables. These rainbow tables contain the password hashes of numerous commonly used passwords.

So the hacker will be to do a simple search with the password hash that he has, and if the password hash exists in the rainbow table, then that means the password is successfully cracked, and we have the password in a plain text. Remember that rainbow tables contain the password hashes of only the passwords which are commonly used.
As a reference, you can go to crackstation

If the password is not a commonly used password, then there comes dictionary attack and brute force attack.

In dictionary attack, you have a wordlist. A wordlist is nothing but a huge text file with loads of passwords. In this attack, the hacker writes a code which compares the password hash to be cracked, with the password hash of each and every password that exists in the wordlist. Now, this attack can be target-specific as well. which means we can build a wordlist targeting an individual provided that we know some basic details about him her.

In a brute force attack, each and every combination of letters ,symbols and numbers are converted into their hash forms, and are then compared with the hash to be cracked. This is a more expensive.

A new technique called salting is introduced by security analysts to give hackers a hard time in cracking passwords.

In this technique, a specific combination of characters are inserted at specific positions of the plain text password before hashing.
Every company has its own salting algorithm, and they don’t make their salting algorithm public

For example, kets say Facebook salting algorithm inserts the string f&2p at the beginning, after the third character, and at the end of the plain text password.
After salting the password, the salted password is then hashed by a hashing algorithm.

So when salting is used, rainbow tables are of no use even if the password to be cracked is a weak commonly used password. Because the hashe of the password without salting do not match the hash of the password which is salted

Also, brute force and dictionary attack are not effective to crack salted passwords unless the hacker already knows the salting algorithm employed by a company.

Visit my website : techraj156
Like my Facebook Page : fb techraj156
Follow me on Instagram : teja.techraj
Follow on Twitter : techraj156
For written tutorials, visit my blog : blog.techraj156

SUBSCRIBE for more videos!
Thanks for watching!
Cheers!


Комментарии к видео This is How Hackers Crack Passwords!


Нет комментариев для этого видео

Похожие на This is How Hackers Crack Passwords! видео

How to be anonymous on the web? Tor, Dark net, Whonix, Tails, Linux How to be anonymous on the web? Tor, Dark net, Whonix, Tails, Linux
от : The Hated One
Скачать | Смотреть
All The Ways To Hack Your Phone: Phreaked Out (Episode 3) All The Ways To Hack Your Phone: Phreaked Out (Episode 3)
от : Motherboard
Скачать | Смотреть
Running an SQL Injection Attack - Computerphile Running an SQL Injection Attack - Computerphile
от : Computerphile
Скачать | Смотреть
Student Finds Hidden Devices in the College Library - Are they nefarious? Student Finds Hidden Devices in the College Library - Are they nefarious?
от : LiveOverflow
Скачать | Смотреть
4 Computer Spy Hacks YOU CAN DO RIGHT NOW (Simple and Clever) 4 Computer Spy Hacks YOU CAN DO RIGHT NOW (Simple and Clever)
от : JLaservideo
Скачать | Смотреть
Hackers: the internet's immune system | Keren Elazari Hackers: the internet's immune system | Keren Elazari
от : TED
Скачать | Смотреть
How to pick open a lock with paper clip - life hack How to pick open a lock with paper clip - life hack
от : Billshowto
Скачать | Смотреть
Billionaire Dan Pena's Ultimate Advice for Students & Young People - HOW TO SUCCEED IN LIFE Billionaire Dan Pena's Ultimate Advice for Students & Young People - HOW TO SUCCEED IN LIFE
от : Motivation2Study
Скачать | Смотреть
Kevin Mitnick: Live Hack at CeBIT Global Conferences 2015 Kevin Mitnick: Live Hack at CeBIT Global Conferences 2015
от : cebitchannel
Скачать | Смотреть
Find Out Who’s Tracking You Through Your Phone Find Out Who’s Tracking You Through Your Phone
от : BRIGHT SIDE
Скачать | Смотреть
உலகின் மிக ஆபத்தான HACKERS | Dangerous Hackers in the World | CyberTamizha உலகின் மிக ஆபத்தான HACKERS | Dangerous Hackers in the World | CyberTamizha
от : Cyber Tamizha - சைபர் தமிழா
Скачать | Смотреть
How to Properly Manage Your Money Like the Rich | Tom Ferry How to Properly Manage Your Money Like the Rich | Tom Ferry
от : Tom Ferry
Скачать | Смотреть
Steve Jobs Introducing The iPhone At MacWorld 2007 Steve Jobs Introducing The iPhone At MacWorld 2007
от : superapple4ever
Скачать | Смотреть
CMD : Show Wi-Fi Password | Windows 10/8/7/XP CMD : Show Wi-Fi Password | Windows 10/8/7/XP
от : Net VN
Скачать | Смотреть
How does your mobile phone work? | ICT #1 How does your mobile phone work? | ICT #1
от : Learn Engineering
Скачать | Смотреть
Watch this hacker break into a company Watch this hacker break into a company
от : CNN Business
Скачать | Смотреть
Google vs DuckDuckGo | Search engine manipulation, censorship and why you should switch Google vs DuckDuckGo | Search engine manipulation, censorship and why you should switch
от : The Hated One
Скачать | Смотреть
Hacking Websites with SQL Injection - Computerphile Hacking Websites with SQL Injection - Computerphile
от : Computerphile
Скачать | Смотреть
4 Smartphone Spy Hacks YOU CAN DO RIGHT NOW (Awesome Spy Apps) 4 Smartphone Spy Hacks YOU CAN DO RIGHT NOW (Awesome Spy Apps)
от : JLaservideo
Скачать | Смотреть
World's Most Famous Hacker Kevin Mitnick & KnowBe4's Stu Sjouwerman Opening Keynote World's Most Famous Hacker Kevin Mitnick & KnowBe4's Stu Sjouwerman Opening Keynote
от : Cyber Investing Summit
Скачать | Смотреть




Зеленского обвинили в уничтожении свободы слова на Украине | Медведица растерзала двоих российских рыбаков | Число умерших от неизвестного заболевания вейперов перевалило за 30 | Российская молодежь разочаровалась в наличных деньгах | Тяжелобольного российского пенсионера «выкрали» из больницы и отправили в СИЗО | Суд обязал «Мангазею» вернуть активы Итакинского месторождения золота Литуеву | Арестанты «Матросской тишины» снова отравились метадоном | Жители российского города получили коммунальные платежки на мертвецов | «Призрак» девушки в стекле напугал пользователей сети | Пластиковые игрушки из прошлого века заполонили британские пляжи | Дзюба потроллил украинского одноклубника | Под Йеллоустоном зафиксировали подъем магмы | Россияне объелись яйцами | Покойная дочь спустя 30 лет вернулась к матери взрослым мужчиной | Горбачев рассказал о своем обращении к Путину