Date of Lecture: 14 October 2013
Summary and feelings of the day:
Today’s talk is pretty technical, so I may sound like a fool if I get some terms or facts wrong. But still, I’ll write this post to the best of my ability.
The talk on cyber security is pretty cool. It started off with the mechanism of Hash; it convinces the server that the user knows his/her password. Take a close look at the picture on the left, and a closer look at the inner gold circle. Can you see the little letters around the eagle? Yeah! That’s a hash! Though I have no idea what it meant. Anyway, the speaker said that reversing a hash will take around 3,000 years. However, a rainbow table, a precomputed table for reversing cryptographic hash functions, quickens the job for cracking password hashes. Together with Ophcrack, a Windows Password cracker based on Rainbow Tables, hash reversing is made easy. Because of the compromise in security, MD5 was developed. According to Wikipedia (haha), the MD5 message-digest algorithm is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value.
He also gave a short demo on SQL Injection, something that I’ve read up on before. =) For example, using “A’ or ‘1’=’1”, could provide a way to hack into an account in the website that doesn’t have form validation.
The next talk was by an employee of IBM.
Gems of the day: