Yusuf On SecuritySecurity news, opinion and advice

212 – Behind the Login Screen – Understanding OS Authentication – Part 2

Hosted by
Yusuf

We are continuing with part 2 of “Behind the Login Screen – Understanding OS Authentication.” If you missed our first episode, I highly recommend giving it a listen before diving into today’s content. In part one, we started to explore the fascinating world of operating system authentications, focusing on Windows, Linux/Unix, and Mac OS. We discussed how hashes are used in authentication, the concept of salt in passwords, rainbow table attacks. 

In today’s episode, we’ll build on that foundation and delve even deeper into the topic of OS authentication mechanisms. So again, if you haven’t already, make sure to catch up on part one to get the full picture.

Now, let’s get started with part two of our journey into the world of OS authentication! lets look at one of the trending security news this week, and that is:

– Newly discovered OpenSSH vulnerabilities.

– https://blog.qualys.com: Qualys TRU Discovers Two Vulnerabilities in OpenSSH: CVE-2025-26465 & CVE-2025-26466

– https://learn.microsoft.com: Kerberos Authentication Overview

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

Join the discussion

More from this show

209 – DeepSeek

Today, we’ve got something really exciting for you. If you’ve been following the world of artificial intelligence lately, you’ve probably...