Главная
Study mode:
on
1
Introduction - Marie Vasek
2
Introduction - Ryan Castellucci
3
Typical RSA Key Generation
4
Typical Eliptic Curve key generation
5
Password cracking input-XKCD Phrases
6
Password cracking input - Phrases
7
Password cracking input - Standard lists
8
Password cracking - Process
9
Password cracking - Job runner read queue
10
Password cracking - Job runner loop
11
Password cracking - Example jobs
12
Password cracking - Random lessons learned
13
Blockchain analysis
14
Password Corpora: 3.9 trilion Candidate Passwords
15
Brain Wallet Usage
16
New Brain Walet Usage by Month
17
Brain Drain Time
18
Brain Wallet Drains over Time
19
Draining complexity
20
Draining: Passphrases vs. Passwords
21
Beyond Brain Walets
22
Large Bitcoin Collider
23
Drains by Bitcoin Mining Pools
24
Questions?
Description:
Explore the security vulnerabilities of brain wallets in cryptocurrency through this BSidesLV conference talk. Delve into the methods used to measure and analyze brain wallet usage and abuse, including password cracking techniques, blockchain analysis, and draining patterns. Learn about typical key generation processes, various password cracking inputs, and the complexities involved in draining brain wallets. Examine the usage trends of brain wallets over time and compare the effectiveness of passphrases versus passwords. Gain insights into related topics such as the Large Bitcoin Collider and drains performed by Bitcoin mining pools. Presented by Ryan Castellucci and Marie Vasek, this comprehensive talk provides valuable information for cybersecurity professionals and cryptocurrency enthusiasts alike.

Measuring the Use and Abuse of Brain Wallets

BSidesLV
Add to list