Password Attacks - SY0-601 CompTIA Security+ : 1.2

Sdílet
Vložit
  • čas přidán 2. 06. 2024
  • Security+ Training Course Index: professormesser.link/sy0601
    Professor Messer’s Course Notes: professormesser.link/601cn
    Professor Messer's Practice Exams: professormesser.link/601ytpe
    Discount Exam Vouchers: professormesser.com/vouchers/
    Professor Messer Recommended Study Materials: professormesser.link/601rs
    - - - - -
    There are many different techniques that the attackers can use to find your password. In this video, you’ll learn about spraying attacks, brute force attacks, hashing, dictionary attacks, rainbow tables, salt, and more.
    - - - - -
    Subscribe to get the latest videos: professormesser.link/yt
    Calendar of live events: professormesser.com/calendar/
    Frequently Asked Questions: professormesser.link/faq
    FOLLOW PROFESSOR MESSER:
    Professor Messer website: professormesser.com/
    Discord chat: professormessermesser.com/dis...
    Twitter: professormesser.com/twitter
    Facebook: professormesser.com/facebook
    Instagram: professormesser.com/instagram
    LinkedIn: professormesser.com/linkedin
  • Věda a technologie

Komentáře • 64

  • @nuchemweinstock9978
    @nuchemweinstock9978 Před 2 lety +120

    Actual story: a user came to me with a Tablet with a pattern password, he told me that he forgot the password, I performed a Google search for the most common pattern passwords, and guess what, the 6th password I tried was the correct one...

  • @thereaper1766
    @thereaper1766 Před 2 lety +145

    Another incredible video. Just passed the exam and absolutely this video is important. Make sure to watch the whole thing!

    • @thatonedudemike3259
      @thatonedudemike3259 Před 2 lety +3

      Congrats!

    • @okegs4real
      @okegs4real Před 2 lety +3

      Congrats. Were you able to secure a job

    • @thereaper1766
      @thereaper1766 Před 2 lety +5

      @@okegs4real Yes absolutely. I was taking this exam to meet the requirements for a job.

    • @okegs4real
      @okegs4real Před 2 lety +2

      @@thereaper1766 what is pay range for cybersec beginner jobs? Did you already have IT experience? I'm completely new to this field, no IT experience

    • @thereaper1766
      @thereaper1766 Před 2 lety +7

      @@okegs4real I actually needed this for a Software Developer position. I had a little IT experience but mostly programming. Also I think pay is VERY regional because it fluctuates a lot based on location.

  • @Spartan045G
    @Spartan045G Před rokem +8

    God, I started watching your videos years ago and I love how you still use Stargate names for things. Funny how when I started I was going into a job for a help desk position, and now I'm a SysAdmin.

  • @ecuadoriano2
    @ecuadoriano2 Před rokem +14

    "Rainbow Tables won't work with Salted Hashes"
    U da man, prof Messer
    Got my A+/Net+, thanks to ur videos, now on to Security+
    Happy New Year

    • @sorakhar
      @sorakhar Před 3 dny

      imagine saying that phrase to someone out of the industry

  • @mohdymi
    @mohdymi Před 2 lety +38

    I'm so astonished, of how great Professor Messer is, his videos are extremely beneficial, and what I love so much about it as well, he dives right in, as soon as the first second of the video begins , which is so time-efficient, much love professor!

  • @BoitumeloNtokozoNgwenya
    @BoitumeloNtokozoNgwenya Před 5 měsíci +5

    watching the whole series for my security+

  • @emperial8889
    @emperial8889 Před rokem +5

    I appreciate Professor Messer is a Stargate fan!

  • @user-gs2wd2zl9l
    @user-gs2wd2zl9l Před rokem +6

    It is really hard for me to listen to the same voice but you keep me incredibly engaged. Thank you for doing this!

  • @Dan-rj8xx
    @Dan-rj8xx Před rokem +4

    2:35 stargate reference... nice!

  • @derekfranklin9783
    @derekfranklin9783 Před 2 lety +9

    I don't see too many comments. I want to thank you for all the help with keeping the information straight to the point but giving awesome examples!

  • @JakeXimus
    @JakeXimus Před měsícem

    You just earned a new level of respect for being a fan of Stargate

  • @dominicbarnes712
    @dominicbarnes712 Před rokem +1

    i love this guy. Brilliant material!

  • @Tairah
    @Tairah Před 2 lety +3

    Thank you so much! Your videos are super helpful!

  • @AboodSpiN
    @AboodSpiN Před rokem

    i love your explanation prof! keep it up!

  • @Facumaglio
    @Facumaglio Před 3 lety +9

    Thanks for the videos, you are amazing.

  • @BoitumeloNtokozoNgwenya
    @BoitumeloNtokozoNgwenya Před 5 měsíci

    great content, very clear and precise

  • @nhiphuongnguyen5449
    @nhiphuongnguyen5449 Před rokem

    This video is incredibly interestinggg!

  • @vagabondmatt5152
    @vagabondmatt5152 Před 2 měsíci

    The stargate reference made me smile lol

  • @whatdoiputhere545
    @whatdoiputhere545 Před 2 lety +7

    I see that Stargate SG1 reference

  • @disQoWiLL
    @disQoWiLL Před 11 měsíci +1

  • @halo2bullseye922
    @halo2bullseye922 Před 5 měsíci

    Thanks Professor Messer! :)

  • @johncrocker2949
    @johncrocker2949 Před rokem +1

    Thank you!

  • @clintmillent
    @clintmillent Před rokem +2

    How do you create a hash?

  • @anthonyreese2929
    @anthonyreese2929 Před měsícem

    how would they know which hashing algorithm to use in order to do a brute force on hash data?

  • @devinrobertson5251
    @devinrobertson5251 Před 4 měsíci

    Question. Lets say person A has the password, "password". And person B has the same exact password. Would both A and B's resulting fingerprint be the same exach hash string?

    • @devinrobertson5251
      @devinrobertson5251 Před 4 měsíci

      Okay further in the video. Using the same algorithm, it ends up being the same hash. So what if you use a different algorithm? Of course it would be different. So is it a good idea for many different types of algorithms to be common to make it even harder for hackers? Or is the Sha one you mentioned the most common?

  • @devinrobertson5251
    @devinrobertson5251 Před 4 měsíci

    How does one "add salt" to a password? Isnt the password saved as a hash upon entering it successfully? So wouldnt that mean youd need to add a random string of stuff to the password before hitting enter? Because that would cause you to have the wrong password and be unable to log in. Or, is it that when you sign into something, the application, or site, will add the random string automatically, prior to generating and writing the hash?

  • @user-px2ik3mr8k
    @user-px2ik3mr8k Před 3 měsíci

    Hi Professor, thanks for your videos. It has been helpful for me to prepare for Security+ exam. I am planning to take practice exam from your website before taking a real exam. I have been watching till this video so far. What do you recommend me about when can I take practice exam ? Is that recommended if I take it after watching all 177 videos or what? Thanks.

  • @richardvanpuymbrouck8297

    Long length and rainbow passwords is what I trust

    • @galloe
      @galloe Před 7 měsíci

      What's a rainbow password?

  • @michaelchigozieobiukwu4044

    How do you do passowrd hash for encription

  • @MrBdc2013
    @MrBdc2013 Před 11 měsíci +1

    tells us not to click suspicious links I immediately check out the link he spoke of and put my email in.

  • @trickwheel
    @trickwheel Před rokem +1

    So I have a question. If you are storing the password, it is so you don't forget it. If you hash the password and store it but can't reverse the hash. How do you retrieve the password for use later?

    • @professormesser
      @professormesser  Před rokem +3

      You don't retrieve the password for use later. That's the point of using the hash as a storage mechanism for passwords.

    • @trickwheel
      @trickwheel Před rokem

      @@professormesser so not physical storage like a password manager? Storage like cpu use or memory?

    • @jenkaigaming
      @jenkaigaming Před rokem +4

      @@trickwheel to my knowledge, I don't think you hash them yourself. Windows hashes your passwords and saves it. When you enter your password to login, it compares that has to the saved hash, if it matches, then it lets you login. You should use a password vault to remember passwords.

    • @trickwheel
      @trickwheel Před rokem +1

      @@jenkaigaming thank you. That makes more sense. I was thinking in simplistic terms of storing a password. Brain fart. 😆

  • @abdullahathar9347
    @abdullahathar9347 Před 7 měsíci

    Let's say 2 user use the same passeword ("12345" in this case), once they generate the hash value for their respective passwords, tho being the same, they will still get unique hash values for the same password. So how does adding random data at the end (salting) of the same password even help? Also how can a hacker utilize a hash value, since they are unique for the same password.

    • @professormesser
      @professormesser  Před 7 měsíci

      The hash values of identical inputs would be the same. The salting provides the additional randomization.

  • @tatertotbot
    @tatertotbot Před rokem

    So is brute-forcing generally done after a hacker gets the password hash?

    • @cvpherhack3r819
      @cvpherhack3r819 Před 9 měsíci

      generally they try to brute force with accquired hashed via a breach of some sort and they can have at it offline. if they try a online attack without the hashes more than likely the account will get locked out after multiple attempts.

  • @joannadodo2526
    @joannadodo2526 Před rokem

    Hi, unfortunately I still don't understand the idea of password file. Can someone explain? why is that for?

    • @rkb3991
      @rkb3991 Před rokem +4

      It’s for you to see how it converted a user to a hash that’s it

  • @KadenBera
    @KadenBera Před 6 měsíci

    My question is if your going to hash your password to not keep it as plain text and then you forget the password, how would you be able to use the hash to get your password again since that would be the reason for writing it down?

    • @bwah9481
      @bwah9481 Před 6 měsíci

      You don't. We set a new password. It's not meant to be retrieved in plaintext ever again. The server hashes the password you're trying to log in with and checks for a match with the hashed password stored.

  • @SukiiBiohazard
    @SukiiBiohazard Před 8 měsíci

    My email was pwnd 8 time since 2013 ;A;