Here is a great how to video on hacking password hashes. Note that he doesn’t need your password. He needs the hash, which he can get from a breach.
Categories: Account and INFO Security
Here is a great how to video on hacking password hashes. Note that he doesn’t need your password. He needs the hash, which he can get from a breach.
5 Comments
Neo Is The One · May 9, 2023 at 11:41 am
Family will leave email open in browser and I said don’t bother me when you get hacked.
Hackers prey on the dullards with zero attention span and they believe it is fair play.
All the tech gadgets have killed attention span along with critical thinking and it will be exploited.
Fido · May 10, 2023 at 2:16 am
The usual defense against this is to hash your password, then hash the hash, and repeat for a few hundred thousand times. This imposes a time delay into each attempt.
On most systems (where the hashes are only available to admin), each attempt imposes a time delay. When you have the hash itself, you can attack it in your own time. By recursive hashing, you force a degree of work to be done for each attempt. The downside is that the normal access also must impose that delay.
EN2 SS · May 10, 2023 at 10:08 am
Question, please.
On the spam sites that someone is fraudulently directed to, if I’m using password manager Bitwarden, will it automatically ask to fill the login? Or will it know that isn’t a legitimate site?
Just curious, thank you.
Divemedic · May 10, 2023 at 11:10 am
Yes, bitwarden and other password wallets will not automatically fill in credentials on an unrecognized site.
https://bitwarden.com/blog/how-password-managers-help-prevent-phishing/
EN2 SS · May 10, 2023 at 3:29 pm
Thank you.
Comments are closed.