Главная
Study mode:
on
1
DerbyCon 2013
2
Objectives
3
Recent Enterprise Password Fails
4
The Historic Password Problem
5
How Modern Passwords Work
6
How Password Complexity Works
7
How Password Length Works
8
How Passwords Are Compromised
9
Obtain and Dump Windows Credentials into Password Cracking Program
10
Inherent Password Problems
11
Recovery Sequencing
12
Dictionary Attack Dynamics
13
Dictionary Recovery Tricks
14
Brute Force Recovery (10)
15
Brute Force Lowercase (26)
16
Brute Force Advance Techniques
17
Removing Restricted Password Lengths
18
Reducing the key Space "Wheel of Fortune" Recovery Methodology . abcdefghijklmnopqrstuvwxyz - 8 Characters - 217,180,147,158
19
Presumed vs. Guaranteed Key Space Complexity
20
Brute Force Password Resistance
21
Length Trumps Complexity
22
Establish Multiple Passwords
23
Consider a Password Vault Service
24
Fixing the Problem
25
Salt and Encrypt Stored Credentials
26
Compromise Detection Strategies
27
Strong Multi-Factor Authentication 3 Types of Authentication
28
2Step != 2Factor Authentication
29
Hard Tokens -Strongest Most Expensive Protection
30
Soft Tokens - Good Protection at a Reasonable Price
31
2FA Application Development
32
The Future of 2FA?
33
Conclusion: 2FA - Knowledge is Power!
Description:
Explore advanced password recovery techniques and modern mitigation strategies in this conference talk from DerbyCon 3.0. Delve into recent enterprise password failures, the historic password problem, and how modern passwords work. Learn about password complexity, length, and common compromise methods. Discover how to obtain and dump Windows credentials into password cracking programs. Examine inherent password problems, recovery sequencing, and various attack dynamics including dictionary and brute force methods. Understand how to reduce key space complexity and implement the "Wheel of Fortune" recovery methodology. Compare presumed vs. guaranteed key space complexity and evaluate brute force password resistance. Gain insights on establishing multiple passwords, considering password vault services, and implementing effective solutions such as salting and encrypting stored credentials. Explore compromise detection strategies and strong multi-factor authentication types. Analyze the differences between 2-step and 2-factor authentication, comparing hard and soft tokens. Investigate 2FA application development and contemplate the future of two-factor authentication in this comprehensive exploration of password security. Read more

Password Intelligence Project - Advanced Password Recovery and Modern Mitigation Strategies

Add to list
0:00 / 0:00