Summary Types of authentication, detailed explanation of password hashing, examples of bad password choices, password cracking methods, and coverage of password security on Unix and Windows systems. 2:55 - Examining the /etc/passwd file in Linux 5:08 - Examining the /etc/shadow file 5:53 - Example of hashed password Reference Materials Guide to Network Defense and Countermeasures - Chapter 1 (pgs. 28-29), Chapter 3 (pgs. 99-100) Additional Information Configuring auditing policies in Windows: Top 5 security settings to audit:











