Go offline with the Player FM app!
212 - Behind the login Screen - Understanding OS Authentication - Part 2
Manage episode 469077303 series 2872461
Enjoying the content? Let us know your feedback!
We are continuing with part 2 of "Behind the Login Screen - Understanding OS Authentication." If you missed our first episode, I highly recommend giving it a listen before diving into today's content. In part one, we started to explore the fascinating world of operating system authentications, focusing on Windows, Linux/Unix, and Mac OS. We discussed how hashes are used in authentication, the concept of salt in passwords, rainbow table attacks.
In today's episode, we'll build on that foundation and delve even deeper into the topic of OS authentication mechanisms. So again, if you haven't already, make sure to catch up on part one to get the full picture.
Now, let's get started with part two of our journey into the world of OS authentication! lets look at one of the trending security news this week, and that is:
- Newly discovered OpenSSH vulnerabilities.
- https://blog.qualys.com: Qualys TRU Discovers Two Vulnerabilities in OpenSSH: CVE-2025-26465 & CVE-2025-26466
- https://learn.microsoft.com: Kerberos Authentication Overview
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
222 episodes
Manage episode 469077303 series 2872461
Enjoying the content? Let us know your feedback!
We are continuing with part 2 of "Behind the Login Screen - Understanding OS Authentication." If you missed our first episode, I highly recommend giving it a listen before diving into today's content. In part one, we started to explore the fascinating world of operating system authentications, focusing on Windows, Linux/Unix, and Mac OS. We discussed how hashes are used in authentication, the concept of salt in passwords, rainbow table attacks.
In today's episode, we'll build on that foundation and delve even deeper into the topic of OS authentication mechanisms. So again, if you haven't already, make sure to catch up on part one to get the full picture.
Now, let's get started with part two of our journey into the world of OS authentication! lets look at one of the trending security news this week, and that is:
- Newly discovered OpenSSH vulnerabilities.
- https://blog.qualys.com: Qualys TRU Discovers Two Vulnerabilities in OpenSSH: CVE-2025-26465 & CVE-2025-26466
- https://learn.microsoft.com: Kerberos Authentication Overview
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
222 episodes
All episodes
×

1 221 - FBI’s 2024 Annual Internet Crime Report 32:16

1 220 - Watering Hole Attacks-The Hidden Danger of Trusted Spaces 32:41


1 218 - Fast Flux-The Cybercriminal's Hide and Seek 26:49

1 217 - Phishing the Expert-The Unexpected Cybersecurity Breach - Part 2 28:32

1 216 - Phishing The Expert-The Unexpected Cybersecurity Breach - Part 1 32:15

1 215 - Cyber Threat Emulation - Strategies for Staying Ahead Of Cyber Attacks 37:04

1 214 - What are polyglot files and how bad are they? 31:58

1 213 - Stealing Data in Plain Sight -How Cybercriminals Exfiltrate Your Secrets and How to Stop Them 50:53

1 212 - Behind the login Screen - Understanding OS Authentication - Part 2 49:05

1 211 - Behind the login Screen: Understanding OS Authentication - Part 2 35:22


1 208 - Lets Encrypt on shortening certification lifetime to just 6 days! 32:38
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.