Rust Password Hashing: Cracking the Shadows
In this video I teach about password hashing by Cracking the /etc/shadow linux file
CODE: https://github.com/masmullin2000/shadow_password_hashing
----
Rust Crypto Project: https://github.com/RustCrypto
sha512_crypt in Rust: https://github.com/RustCrypto/password-hashes/blob/master/sha-crypt/src/lib.rs
Description of sha-crypt: https://www.akkadia.org/drepper/SHA-crypt.txt
NIST 800-132: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf
NIAP Mobile Device Security Guidelines: https://www.niap-ccevs.org/MMO/PP/455/mobile-device-release.htm#FCS_COP.1.1/CONDITION
Argument Against sha-crypt: https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
glibc's crypt function: https://man7.org/linux/man-pages/man3/crypt.3.html
Shadow File Format: https://www.cyberciti.biz/faq/understanding-etcshadow-file/
AUR Wordlists: https://aur.archlinux.org/packages/wordlists
Видео Rust Password Hashing: Cracking the Shadows канала Michael Mullin
CODE: https://github.com/masmullin2000/shadow_password_hashing
----
Rust Crypto Project: https://github.com/RustCrypto
sha512_crypt in Rust: https://github.com/RustCrypto/password-hashes/blob/master/sha-crypt/src/lib.rs
Description of sha-crypt: https://www.akkadia.org/drepper/SHA-crypt.txt
NIST 800-132: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf
NIAP Mobile Device Security Guidelines: https://www.niap-ccevs.org/MMO/PP/455/mobile-device-release.htm#FCS_COP.1.1/CONDITION
Argument Against sha-crypt: https://pthree.org/2018/05/23/do-not-use-sha256crypt-sha512crypt-theyre-dangerous/
glibc's crypt function: https://man7.org/linux/man-pages/man3/crypt.3.html
Shadow File Format: https://www.cyberciti.biz/faq/understanding-etcshadow-file/
AUR Wordlists: https://aur.archlinux.org/packages/wordlists
Видео Rust Password Hashing: Cracking the Shadows канала Michael Mullin
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Your own fast and !!!!CHEAP!!!!! VPN](https://i.ytimg.com/vi/UjKataPtFG4/default.jpg)
![Put a VM in a Network Container: Using iproute2 to double isolate your virtual machine networks](https://i.ytimg.com/vi/h1sptaitoRs/default.jpg)
![A Gentle Introduction to BPF using bpftrace](https://i.ytimg.com/vi/-JxEUKE--RA/default.jpg)
![Building a Skeleton Linux Security Module (LSM)](https://i.ytimg.com/vi/Y0QZpan5LbU/default.jpg)
![Finding Linux Kernel Bugs with Syzkaller: Debugging the Kernel pt2](https://i.ytimg.com/vi/50XmhnJO5p8/default.jpg)
![eBPF with GO: A Gentle Introduction](https://i.ytimg.com/vi/eZp_3EjJdnA/default.jpg)
![How to ensure libhardened malloc is used by your binary](https://i.ytimg.com/vi/gdddOvfDePg/default.jpg)
![Can ARM Processors Save the Planet? A look a energy efficiency of ARM vs x86](https://i.ytimg.com/vi/mYSD0tiNe2Q/default.jpg)
![Plug WASM into Rust with wit-bindgen](https://i.ytimg.com/vi/pQ5PWMYg3xg/default.jpg)
![A follow up to Hardened Malloc](https://i.ytimg.com/vi/i7sAGaOec2M/default.jpg)
![Howto: Run Centos8 stream in the firecracker VMM](https://i.ytimg.com/vi/QQeKOkKjLwY/default.jpg)
![Running an external custom kernel in Fedora 32 under QEMU: Kernel Debugging Part 1](https://i.ytimg.com/vi/OdybsP9cQNA/default.jpg)
![Lets Review some Code](https://i.ytimg.com/vi/tAhwk9PU1Kk/default.jpg)
![Episode4: Self Hosted Kubernetes with BPF](https://i.ytimg.com/vi/9RyJDDQCCXU/default.jpg)
![BPF Programming with C++: A Gentle Introduction to BPF Programming Part 3](https://i.ytimg.com/vi/Q9-gnOavPLA/default.jpg)
![Episode2: Self Hosted Kubernetes with BPF](https://i.ytimg.com/vi/0JlBeT0YMZc/default.jpg)
![Diving Deeper into Linux Security Modules](https://i.ytimg.com/vi/_sWGnxVmnIU/default.jpg)
![I need help with bpf_override_return](https://i.ytimg.com/vi/gzdNz5D9yjA/default.jpg)
![Episode3 - Self Hosted Kubernetes with BPF](https://i.ytimg.com/vi/Ti17_mc9X_I/default.jpg)
![BPF code with Python: A Gentle Introduction to BPF part 2](https://i.ytimg.com/vi/ayxHANt1YaI/default.jpg)