SHA-1 Backdooring and Exploitation
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the intricacies of SHA-1 backdooring and exploitation techniques in this 29-minute conference talk presented by J.P. Aumasson at BSidesLV 2014. Delve into the Common Ground session held at the Tuscany Hotel on August 05, 2014, where the speaker shares insights on potential vulnerabilities and attack vectors associated with the SHA-1 cryptographic hash function. Gain a deeper understanding of how backdoors can be implemented in SHA-1 and learn about the methods used to exploit these weaknesses. This talk is essential for cybersecurity professionals, cryptography enthusiasts, and anyone interested in the security implications of widely-used hash functions.
Syllabus
CG - SHA-1 Backdooring and Exploitation - J.P. Aumasson
Taught by
BSidesLV
Related Courses
Early Detection through DeceptionYouTube Hack for Show, Report for Dough - Brian King
YouTube Blue Teamin on a Budget of Zero - Kyle Bubp
YouTube Windows Event Logs - Zero to Hero
YouTube Weaponizing Splunk - Using Blue Team Tools for Evil
YouTube