Password attacks (2.4)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/3

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

4 Terms

1
New cards

Plaintext / unencrypted passwords

Applications that store passwords “in the clear” meaning no encryption and you can read the stored password as plaintext.

2
New cards

hashing a password

The hash represents as like a fingerprint for a password, should not have collision, and should be impossible to recover the original password

3
New cards

Spraying attack

When an attacker uses a list of common passwords to try and get into an account but only try a certain amount to prevent a lockout

4
New cards

What does the brute force hash process look like?

An attacker hash for the right password, but they need the plain text so they continuously put in different combos of plain text until the hash matches