1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Pass the Hash Attack
Hacking technique that allows the attacker to authenticate to a remote server or service by using the underlying hash of user’s password instead of requiring the associated plaintext password
Birthday Attack
Occurs when an attacker is able to send tw odifferent messages through a hash algorithm and it results in the same identical hash digest, referred to as a collision
Mimikatz
Provides the ability to automate the process of harvesting the hashes and conducting the pass the hash attack
Key Stretching
Technique that is used to mitigate a weaker key by increasing the time needed to crack it
Salting
Adding random data into a one-way cryptographic hash to help protect against password cracking techniques
Dicitonary Attack
When an attacker tries every word from a predefined list
Brute-force Attack
When an attacker tries every possible password combination
Rainbow Tables
Precomputed tables for reversing cryptographic hash functions
Nonce
Stands for “number used once”, is a unique, often random number that is added to password-based authentication process