CS3216 Lecture (Week 8)

Date of Lecture: 14 October 2013

Summary and feelings of the day:
Today’s talk is pretty technical, so I may sound like a fool if I get some terms or facts wrong. But still, I’ll write this post to the best of my ability.

United-States-Cyber-Command-logo
The talk on cyber security is pretty cool. It started off with the mechanism of Hash; it convinces the server that the user knows his/her password. Take a close look at the picture on the left, and a closer look at the inner gold circle. Can you see the little letters around the eagle? Yeah! That’s a hash! Though I have no idea what it meant. Anyway, the speaker said that reversing a hash will take around 3,000 years. However, a rainbow table, a precomputed table for reversing cryptographic hash functions, quickens the job for cracking password hashes. Together with Ophcrack, a Windows Password cracker based on Rainbow Tables, hash reversing is made easy. Because of the compromise in security, MD5 was developed. According to Wikipedia (haha), the MD5 message-digest algorithm is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value.

He also gave a short demo on SQL Injection, something that I’ve read up on before. =) For example, using “A’ or ‘1’=’1”, could provide a way to hack into an account in the website that doesn’t have form validation.

The next talk was by an employee of IBM.

Gems of the day:
NIL

Additional comments:
NIL

Advertisements

4 thoughts on “CS3216 Lecture (Week 8)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s