Chapter 11. Passwords, Vulnerabilities, and Exploits

Topics we'll investigate in this chapter:

▪ Authentication
▪ Passwords
▪ Understanding Password Cracking
▪ Authentication Devices
▪ Social Engineering and Phishing
▪ Vulnerabilities and Exploits
Summary
Frequently Asked Questions

Introduction

Operating systems, networks, and other systems that have integrated security (or the illusion of it) need to be able to identify who is attempting to use the system. In most systems, this is done through a combination of a username and password, although other methods of identifying the user may also be used. Once the system has established who you are, it can then give you the authorized level of access associated with your account. For example, on a network, ...

Get Scene of the Cybercrime, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.