Niflheim World

Welcome to Niflheim !

  • First 5 messages from new users (pre-moderated user) will be checked for flood/spam before being posted on the forum. Users will also be checked for a multi-account.
    If you want to communicate without delay, get a free Huscarl status (how to get - User Groups), or buy premium status to see all hidden content (how to buy - Premium status)

    The administrator has only one telegram - @ftmadmin and our chat - Link on chat

[Udemy] Ethical Hacking: Crypto 101

  • Thread starter User_37997
  • Start date
  • Replies 2
  • Views 2K

U

User_37997

Guest

In this course you will learn about basic crypto for ethical hackers. You will learn about hashing, how to crack windows password hashes, how to crack linux hashes and about cryptography. Hashing is a process of converting a given input into a fixed-size alphanumeric string. The output of a hash function is often referred to as a message digest or simply, a hash. A good hash function satisfies the following properties: it is easy to compute the hash value for any given message, it is infeasible to generate two different messages that result in the same hash value, it is infeasible to modify a message without changing its hash value, and it is infeasible to determine the original message from its hash value.

When used properly, hashing can be an effective way to store sensitive data such as passwords while keeping them safe from prying eyes. This is because even if someone were to obtain the hash value of a password, they would still need to brute force guess the actual password which would be incredibly time consuming (if not impossible) with today's computing power.

After completing this course, you will be able to crack the passwords hashes from a Windows and Linux computer and find all users passwords using hash cracking tools. You will also be able to verify data integrity and understand basic crypto.

 
shape1
shape2
shape3
shape4
shape7
shape8
Top