From the course: CertNexus Cyber Secure Coder (CSC-110) Cert Prep
Unlock this course with a free trial
Join today to access over 24,800 courses taught by industry experts.
Challenge: Hashing passwords
From the course: CertNexus Cyber Secure Coder (CSC-110) Cert Prep
Challenge: Hashing passwords
- Well, hey there and welcome back. I know we just finished up, but well, the boss man's back on my back and, therefore, back on your back. We've been implementing that authentication system. Looks like our validation works but we started hashing our passwords and things went horribly awry. So the boss was like, "Hey, we need to fix this"; security team says, "we got some issues". And well, let me just show you what I'm talking about. We take a look at my screen here. It looks very similar. We already have that validation function but let's come down here and look at and I have things arranged a little differently so we can see left to right. We have this generate password hash. This comes from needing to store a password. If you're ever thinking about storing plain text passwords? No. Remember. No. Bad, shame, no. Now plain text passwords. I want to handle plain text passwords as little as possible. Mainly…
Contents
-
-
-
Prior knowledge and expectations4m 50s
-
(Locked)
Gather software requirements13m 17s
-
(Locked)
Challenge: Identity requirements2m 6s
-
(Locked)
Solution: Identify requirements8m 18s
-
(Locked)
Factors that undermine software security10m 39s
-
(Locked)
Software vulnerabilities and attack phases9m 38s
-
(Locked)
Attack patterns19m 18s
-
(Locked)
Challenge: Find vulnerabilities3m 8s
-
(Locked)
Solution: Find vulnerabilities10m 18s
-
(Locked)
Challenge: New password requirements3m 12s
-
(Locked)
Solution: New password requirements9m 22s
-
(Locked)
Challenge: Hashing passwords3m 42s
-
(Locked)
Solution: Hashing passwords19m 1s
-
(Locked)
Vulnerability intelligence13m 13s
-
(Locked)
Challenge: Vulnerability search4m 2s
-
(Locked)
Solution: Vulnerability search15m 31s
-
-
-
-
-
-