Загрузка...

SANS Webcast: Time is on your side username harvesting via timing attacks

Learn Web App Pen Testing: www.sans.org/sec542
Presented by: Eric Conrad

You are faced with a seemingly well-designed authentication form: it returns the same error for good username/bad password and bad username/bad password, and it also uses a slow hash algorithm such as bcrypt. Username guessing should be impossible, and password cracking impractical. Many penetration testers will move on: what do you do?

This webcast will describe a practical approach for using timing attacks to harvest valid usernames, including a live demo using Burp Suite.

Видео SANS Webcast: Time is on your side username harvesting via timing attacks канала SANS Offensive Operations
Яндекс.Метрика

На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.

Об использовании CookiesПринять