YoVDO

Building Dictionaries and Destroying Hashes Using Amazon EC2

Offered By: YouTube

Tags

Hack3rcon Courses Cybersecurity Courses Ethical Hacking Courses Amazon EC2 Courses Password Security Courses Hashing Algorithms Courses

Course Description

Overview

Explore password cracking techniques and methodologies in this conference talk from Hack3rcon 2012. Learn about hashing algorithms, salting, and the importance of password security. Discover how to leverage Amazon EC2 for efficient password cracking, including setup, pricing, and optimization strategies. Gain insights into popular password databases, cracking tools, and the effectiveness of various hashing methods. Understand the ethical implications and practical applications of password cracking in cybersecurity. Delve into topics such as dictionary building, hash destruction, and the use of cloud computing resources for enhanced cracking capabilities.

Syllabus

Introduction
Steves background
Disclaimer
Agenda
What is a hash
How to do password cracking
Why do password cracking
Variables
Theory
What is a salt
Time it takes
Different hashing algorithms
RockYou
ERMe Database
Methodology Tools
Cracking Passwords
Amazon EC2
EC2 Console Dashboard
Preconfigured Systems
Shutdown Behavior
Server Configuration
Launch Instance
Instance Availability
Pricing
Testing Systems
eHarmony
Why PHP
Syntax
Splitting the hash file
Rules
Top Passwords
Job Rates
Bcrypt
Total Cost
Cloud Sucking
Spot Instances
Password Cracking
Speed


Related Courses

Digitale Identitäten - Wer bin ich im Netz?
openHPI
Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn
Security Awareness Training
(ISC)² via Coursera
Learn Social Engineering From Scratch 2024
Udemy
Certified Ethical Hacker دورة إعداد الـ
Udemy