Главная
Study mode:
on
1
Introduction
2
Data Collection
3
Passwords
4
Company Names
5
Password Length
6
Converting English to another language
7
South Africa
8
Research
9
Experiment
10
Special characters
11
Capsulization
12
Weak Passwords
13
Months
14
Words Breakdown
15
Password Hash Breakdown
16
Analysis
17
In Conclusion
18
Fish Eagle
19
Zulu
Description:
Explore an investigation into the security of passwords derived from African languages in this 29-minute conference talk from BSidesLV 2019. Delve into data collection methods, password analysis techniques, and the impact of converting English to other languages on password strength. Examine the use of company names, special characters, and capitalization in password creation. Learn about weak password patterns, including the use of months and common words. Gain insights from password hash breakdowns and overall security analysis. Conclude with a focus on South African languages and cultural references, including the significance of the Fish Eagle in Zulu culture.

An Investigation of the Security of Passwords Derived From African Languages

BSidesLV
Add to list