CS3216 Lecture (Week 8)

Date of Lecture: 14 October 2013

Summary and feelings of the day:
Today’s talk is pretty technical, so I may sound like a fool if I get some terms or facts wrong. But still, I’ll write this post to the best of my ability.

The talk on cyber security is pretty cool. It started off with the mechanism of Hash; it convinces the server that the user knows his/her password. Take a close look at the picture on the left, and a closer look at the inner gold circle. Can you see the little letters around the eagle? Yeah! That’s a hash! Though I have no idea what it meant. Anyway, the speaker said that reversing a hash will take around 3,000 years. However, a rainbow table, a precomputed table for reversing cryptographic hash functions, quickens the job for cracking password hashes. Together with Ophcrack, a Windows Password cracker based on Rainbow Tables, hash reversing is made easy. Because of the compromise in security, MD5 was developed. According to Wikipedia (haha), the MD5 message-digest algorithm is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value.

He also gave a short demo on SQL Injection, something that I’ve read up on before. =) For example, using “A’ or ‘1’=’1”, could provide a way to hack into an account in the website that doesn’t have form validation.

The next talk was by an employee of IBM.

Gems of the day:

Additional comments:


4 thoughts on “CS3216 Lecture (Week 8)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s