Главная
Study mode:
on
1
Intro
2
Agenda
3
About me
4
What is a hash
5
How do we crack passwords
6
Making hashes stronger
7
Mega breaches
8
Opportunity vs target
9
Offline credential stuffing
10
Improvements
11
Questions
12
Random Passwords
13
Password Streams
14
Random Words
Description:
Explore advanced techniques for exploiting password reuse vulnerabilities in this BSidesLV conference talk. Delve into the intricacies of password hashing, cracking methods, and the impact of mega breaches on cybersecurity. Learn about offline credential stuffing, strategies for strengthening hashes, and the balance between opportunistic and targeted attacks. Gain insights into improvements in password security, the concept of password streams, and the use of random words in password creation. Engage with a comprehensive agenda covering topics from hash fundamentals to cutting-edge password exploitation techniques, concluding with a Q&A session to address specific queries and concerns.

Abusing Password Reuse at Scale - Bcrypt and Beyond

BSidesLV
Add to list