Sponsored by ComputerWeekly.com
Attackers are increasingly turning to human psychology and the study of password selection patterns among user groups to develop sophisticated techniques that can quickly and effectively recover passwords. Passwords are commonly protected by applying a one-way cryptographic algorithm that produces a hash of set length given any password as input. However, cryptography can only protect something to the point where the only feasible attack on the encrypted secret is to try to guess it. When it comes to passwords, guessing can be easy. Access >>>
Table of contents
- The password cracking toolbox
- The study of password selection patterns
- The proof-of-concept attack
Premium Content for Free.
More Premium Content Accessible For Free
A guide to storage and virtualisation
Virtualisation brings benefits to the datacentre, but it also brings big changes to storage provisioning and management. We look at the key ...
Agile Foundations – the Agile Manifesto
In this extract from their book, Agile Foundations, Peter Measey and Radtac explain the key principles of the Agile Manifesto.
Big Data BlackOut: Are Utilities Powering Up Their Data Analytics?
This report from Capgemini Consulting identifies a disparity between the utilities industry's perception of big data analytics and its implementation...