From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Authenticating a user
From the course: Ethical Hacking: System Hacking
Authenticating a user
- [Narrator] Operating systems authenticate user login information in a variety of ways. In this segment, we'll compare how Microsoft and Linux/Unix systems provide authentication. In most cases, we must provide some way to authenticate to gain access to a system. First, let's talk about how a Microsoft operating system provides authentication using New Technology LAN Manager or Kerberos. Microsoft has a proprietary authentication protocol called New Technology LAN Manager, which is used within a Windows network environment. New Technology LAN Manager employs a challenge response authentication method where the server presents a challenge and the client must provide a valid response based on the hashed value of the user's password to be authenticated. Kerberos is built into Active Directory and uses tickets to access network services. User accounts and passwords are stored on the domain controller, which also acts as the Kerberos key distribution center and uses Active Directory as…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.