From the course: CompTIA CySA+ (CS0-002) Cert Prep: 2 Vulnerability Management (2020)

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Password attacks

Password attacks

- [Instructor] Passwords secure access to the vast majority of systems today. This time-tested approach does provide adequate security for many purposes, but also has potential drawbacks. Attackers can wage attacks designed to crack passwords stored in system files. Many recent attacks used this approach to steal massive numbers of user accounts. Let's take a look at some password attacks. On Linux systems password files contain user credentials when a user attempts to log in to a system the login process checks the password file to determine whether the password is valid. Now of course the password doesn't simply contain a copy of the password, that would be an easy target for attackers and would also allow system administrators to know all of the user passwords on a system. Instead the password file contains a password hash shown here, computed using a one-way hash function. When the user logs in, the login process takes the…

Contents