[types field=”intro”]


Download HD | Download MP4


[types field=”notes”]

Hak5 1106 – How To Setup Two Factor Authentication in Backtrack Linux


  • NoSco

    may i just say, darren looked a little drunk in part 2 after the break… lulz 😉 love you guys and keep up the great work “drinking all the booze, hacking all the things, and killing all the humans.” 😉

  • rami_info

    Hi hak5 crew
    I really enjoy, love the show bc’se that’s awesome since I’m learning linux directly by practice inspite of doing theory without ./make &
    for real world.
    I’m using backtrack5 as my linux world to turn all my linux dreams into real with you Darren and Shannon;
    Great thnx a lot, keep on doing good job.

    I asked Sir Darren last year to cpmpress the HD files but he replied that there are other small formats available also: I understund but I only watch hak5 on HD even with my little bandwidth as it’s awesome with high quality so please try to compress them only for 48 hours and delete them (I understund the hard dsik space therre @ hakhouse);


  • CaptainHooligan

    This two factor authentication isn’t practical compared to other options available. Google-Authenticator has a PAM module that is very easy to install and setup. Yubikeys also work via a PAM module. This is a quick install and 1 line edit then two factor authentication is up and running!

  • AndreyS

    Hi, folks.

    Thanks for great stuff. It brings more fun in out lifes. =)
    My tip is to use “shared memory” in /dev/shm as storage for decrypted shadow file. I think it’s more simple in compare to making tmpfs partition in RAM. =)

  • redonkuless

    Possible solution, any thoughts:


    * Library Password Token (.h file for c)
    * Randomly Generated – put in #define tokenpass 83adf983n2nfaz8fo9n3f (32+ bit long)

    Place USB stick in:
    Load daemon, on first load: Regenerate all usernames and passwords
    *system accounts auto generate*
    Daemon creates splits new shadow file hash, puts half on usb and encrypts usb with tokenpass, it can also format the hash lines randomly to prevent guessing which half hash goes to which account.
    Daemon then only prints its half of the hash, on the encrypted system with a identifier to read random hash order.

  • how to freestyle rap

    Hi this ?? kind of of off topic but I ?a? wondering if blogs u?e WYSIWYG editors ?r if
    you have to manually code ?ith HTML. I’m starting a blog
    soon but ha?e no coding experience so I wated t? get guidance f?om s?meone with experience.
    Any h?lp would ?e enormously appreciated!

  • LizzetteMWyze

    Hey, I think your site might be having browser compatibility issues.
    When I look at your blog site in Safari, it looks fine but when opening in Internet Explorer, it
    has some overlapping. I just wanted to give you a quick heads up!
    Other then that, fantastic blog!

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>