Главная
Study mode:
on
1
Introduction
2
Who am I
3
The Ashley Madison leak
4
Password management policies
5
Definitions
6
How hashes work
7
Cryptographic hashes
8
Examples of hash functions
9
Hash is oneway functions
10
Password space
11
Collisions
12
Google announcement
13
How servers store passwords
14
Logins work
15
We can pretend
16
Bruteforcing
17
Permutation
18
Parallel lines
19
Rainbow tables
20
Reduction function
21
Rainbow table
22
Rainbow table example
23
Rainbow table downsides
24
Worst case
25
Sequence of reduction
26
New idea
27
What hash function does
28
What if we track regions
29
A few more definitions
30
Some more examples
31
What does this mean
32
Storing the digest
33
Groovy technology
34
Spacetime tradeoffs
35
Data structure
36
Hash functions
37
Bloom filters
38
Bloom reverse system
39
Brute force
40
Example
Description:
Explore cutting-edge techniques in password hash reversal in this 59-minute conference talk from Bloomcon 2017. Delve into the intricacies of cryptographic hashes, password management policies, and the implications of the Ashley Madison leak. Learn about brute-forcing methods, rainbow tables, and their limitations. Discover innovative approaches like region tracking and Bloom filters for more efficient password cracking. Gain insights into space-time tradeoffs, data structures, and the latest developments in hash function analysis. Understand the potential impact of these advancements on cybersecurity and password protection strategies.

New Results in Password Hash Reversal

Add to list