Cyber Defense and Penetration Testing: Week 7 - Password Cracking

LoadingLoading previews...
Password Cracking
HTML Creative Commons: Attribution-Noncommercial-No Derivative Works 4.0
View
    Password Cracking
    Password Cracking
    1 file in this resource
    Summary: Generally, the goal of a hacker is to authenticate to the target with the highest level of access and permissions possible, then remove evidence of an attack. To hack a target system, an attacker has to establish the passwords associated with active usernames, escalate the level of permission where possible by exploiting operating system vulnerabilities, and erase traces that they were there. To achieve this successfully, an attacker has to be able to: employ various password cracking techniques and tools, escalate privileges, hide files, cover tracks, and erase evidence, maintain access via rootkits. When the user provides an identity to gain access to a system, there has to be a mechanism to ensure that the assumed identity is valid. Authentication verifies a user' s claimed identity is valid (binding of identity to subject), by something unique to the individual. The most common surrogate from of authentication is the password ('something you know') which is assumed secret. Knowledge of the password is assumed to guarantee that the user is authentic. While a username (rarely secret) identifies an account, the password is the key to a person online identity. Passwords are a prime target for hackers to use in order to gain unauthorised access to critical data systems.
    Creators:
    Divisions: Academic > School of Computing, Engineering and Built Environment > Department of Computing
    Copyright holder: Copyright © Glasgow Caledonian University
    Viewing permissions: World
    Depositing User:
    Date Deposited: 26 Sep 2018 13:44
    Last Modified: 13 Feb 2020 12:09
    URI: https://edshare.gcu.ac.uk/id/eprint/4128

    Actions (login required)

    View Item View Item

    Toolbox

    There are no actions available for this resource.