SANS Webcast: Time is on your side username harvesting via timing attacks
Learn Web App Pen Testing: www.sans.org/sec542
Presented by: Eric Conrad
You are faced with a seemingly well-designed authentication form: it returns the same error for good username/bad password and bad username/bad password, and it also uses a slow hash algorithm such as bcrypt. Username guessing should be impossible, and password cracking impractical. Many penetration testers will move on: what do you do?
This webcast will describe a practical approach for using timing attacks to harvest valid usernames, including a live demo using Burp Suite.
Видео SANS Webcast: Time is on your side username harvesting via timing attacks канала SANS Offensive Operations
Presented by: Eric Conrad
You are faced with a seemingly well-designed authentication form: it returns the same error for good username/bad password and bad username/bad password, and it also uses a slow hash algorithm such as bcrypt. Username guessing should be impossible, and password cracking impractical. Many penetration testers will move on: what do you do?
This webcast will describe a practical approach for using timing attacks to harvest valid usernames, including a live demo using Burp Suite.
Видео SANS Webcast: Time is on your side username harvesting via timing attacks канала SANS Offensive Operations
Комментарии отсутствуют
Информация о видео
11 августа 2016 г. 1:50:52
00:56:51
Другие видео канала