Artwork
iconShare
 
Manage episode 493460188 series 3675874
Content provided by National Media Archive. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by National Media Archive or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

In this episode, we talk about over sixty methods used to steal or bypass passwords, covering how attackers gain physical access to devices, buy breached credentials from forums, exploit reused passwords, break into databases with Structured Query Language injection, brute force login pages with tools like Hydra and Burp Suite, crack hashes with John the Ripper and Hashcat, use Mimikatz and Responder on Microsoft Windows networks, and trick help desks and unsuspecting users with phishing and fake websites. We also explain how password managers and email accounts become gateways to entire digital identities, why session hijacking and private key theft remain dangerous, and how weak policies and reused passwords continue to leave millions vulnerable across industries, companies, and personal devices.

Join us on Apple Podcasts or Patreon to explore all topics covered by the National Media Archive:

  continue reading

2 episodes