Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,060 --> 00:00:05,610
In this video, we're going to take a look at on passwords now passwords are typically stored in what's
2
00:00:05,610 --> 00:00:08,340
called a hash value or an encrypted value.
3
00:00:09,220 --> 00:00:15,310
Now, these are typically either SHA one, 128 or SHA256 types of hashes.
4
00:00:16,390 --> 00:00:22,330
And if you're dealing with data dumps, chances are you're going to find more hash passwords than you
5
00:00:22,330 --> 00:00:24,310
are going to be plain text passwords.
6
00:00:25,060 --> 00:00:28,950
And if you need to be, you know, if you need to be able to see what that password is.
7
00:00:30,060 --> 00:00:36,750
You could actually use a program to rehash it, popular ones or things like John the Ripper, John the
8
00:00:36,750 --> 00:00:40,380
Ripper will actually go in and try to de hash password.
9
00:00:40,390 --> 00:00:44,610
You could you could try to use brute force techniques and whatnot.
10
00:00:45,790 --> 00:00:49,390
Another method is we're going to take a look at a website called.
11
00:00:50,720 --> 00:00:53,870
MD5 hash, inordinate forward slash hash.
12
00:00:54,050 --> 00:00:59,450
Now this is pretty easy to to use, and we could take a look at how it works on both ends.
13
00:01:00,050 --> 00:01:01,730
So I'm going to calculate a hash.
14
00:01:01,730 --> 00:01:08,330
I'm going to type in a plain string, OK, so I'm going to type in password and we're going to just
15
00:01:08,330 --> 00:01:09,080
hash this.
16
00:01:09,980 --> 00:01:13,850
And this is what password looks like as a MD5.
17
00:01:15,040 --> 00:01:16,570
OK, so I'm going to copy this here.
18
00:01:18,430 --> 00:01:21,460
OK, and we're going to go back to hash on hash, so.
19
00:01:23,870 --> 00:01:29,480
If we go to MD5, I know the MD5 password hash of paces in here, and we're tried to code it.
20
00:01:33,010 --> 00:01:33,370
OK.
21
00:01:33,700 --> 00:01:34,390
And.
22
00:01:35,830 --> 00:01:38,320
We got through there, and let's take a look.
23
00:01:41,720 --> 00:01:44,090
We could see the password is password right there.
24
00:01:45,090 --> 00:01:48,870
And this is what was the actual MD5 password hash.
25
00:01:49,810 --> 00:01:55,000
So if we go back in here, we could actually click down here to see all the different values here Mdm2
26
00:01:55,000 --> 00:01:59,050
a.45 Sha one shot 224 256.
27
00:02:00,720 --> 00:02:06,360
384 or 512 and so on and so forth, there's actually quite a number of different hash values in here.
28
00:02:08,090 --> 00:02:12,650
And we also take a look at recently hash list here.
29
00:02:13,280 --> 00:02:19,250
And these are typically the password hashes that were already uploaded here, and these are the cracked
30
00:02:19,460 --> 00:02:20,240
hash value.
31
00:02:20,260 --> 00:02:27,170
So if you have a hash value, you can also do a search and just see if that particular password came
32
00:02:27,170 --> 00:02:27,890
up before.
33
00:02:28,860 --> 00:02:31,650
Doesn't necessarily mean it's the user that you're looking for.
34
00:02:31,670 --> 00:02:36,920
It just could mean, well, quite possibly that it's the same type of password that someone else to
35
00:02:36,920 --> 00:02:39,710
use, which is probably going to be a common password.
36
00:02:40,400 --> 00:02:45,980
However, the great thing is if you find a person with a unique password, and that's what we're always
37
00:02:45,980 --> 00:02:51,440
hoping for a unique password because after all, unique passwords are going to be much more secure than
38
00:02:51,440 --> 00:02:54,020
saying using password or admin.
39
00:02:54,960 --> 00:02:59,790
Or any number of really terrible passwords that could be cracked pretty quick.
40
00:03:01,250 --> 00:03:07,700
Having a unique password, finding that unique password or or even that unique password hash, we could
41
00:03:07,700 --> 00:03:13,370
potentially find that password being used somewhere else because let's be honest, people are typically
42
00:03:13,370 --> 00:03:14,690
really bad about passwords.
43
00:03:14,690 --> 00:03:20,630
They tend to reuse the same password for several things and finding that password value, we could potentially
44
00:03:20,630 --> 00:03:23,780
find that other accounts that person use that password at.
45
00:03:25,150 --> 00:03:32,050
So again, this was about hashing passwords, hashing passwords, how it works and how to rehash it.
46
00:03:32,200 --> 00:03:35,410
And again, we're using MD5 hash dot net for this.
47
00:03:35,890 --> 00:03:36,700
Thanks for watching.
48
00:03:36,730 --> 00:03:37,600
I'll see you next VIDEO.
4839
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.