YoVDO

Lotus Notes Password Hash Redux - Vulnerabilities and Mitigation

Offered By: YouTube

Tags

Conference Talks Courses Vulnerability Assessment Courses Password Hashing Courses Enterprise Software Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about the vulnerabilities and security challenges associated with Lotus Notes in this conference talk from Bsides Las Vegas 2012. Explore the history of weaknesses, tools for exploitation, and mitigation strategies. Discover insights into companies using Lotus Notes, performance issues, and IBM's response. Gain valuable knowledge about password hash formats, enumeration techniques, and the implications for clustered environments. Understand the speaker's methodology, including Google searching, scraping, and analysis of findings. Delve into the complexities of SameTime and its security implications within the Lotus Notes ecosystem.

Syllabus

Introduction
Who am I
Agenda
Lotus Notes
SameTime
Who uses Lotus Notes
Companies using Lotus Notes
Previous work
History of weakness
Tools
Google Search
Alabama
clustered environment
rip
enumerate
showdown
results
what do I do
scraping
hash formats
performance issues
findings
mitigations
IBM


Related Courses

Build a SMS Verification with Login System Using PHP MySQL
Udemy
Secured Login Registration System in PHP - Email Activation
Udemy
Complete Login/Registration System in PHP & MYSQL 2021
Udemy
PHP Login and Registration System - Email Confirm Activation
Udemy
Introduction to User Authentication in PHP Course (How To)
Treehouse