Главная
Study mode:
on
1
Intro
2
11 Bad Things We Do To Good Passwords
3
Password Requirements
4
The Effects of Password Constraints
5
Why a Monte Carlo Simulation?
6
The Python Script
7
The Unconstrained Password is a Myth
8
Constraints Take A Toll
9
Piglet la The First Casualty
10
The Lowercase Constraint
11
Assault With A Number Constraint On A Password
12
Aggravated Assault With A Symbol Set Constraint
13
Balancing Entropy With Human Behavior
14
Prevalence of Symbols
15
Composition By Character Set Choices
16
Character Set Choices By Length
17
First Character Analysis
18
First and Last Character Analysis
19
The 2 Million Password Dump
20
The Great Password Equalizer
21
Acknowledgements
Description:
Explore a conference talk from BSidesLV 2018 that delves into the impact of password constraints on the number of viable permutations. Examine 11 common practices that negatively affect password strength, analyze various password requirements, and understand their effects through Monte Carlo simulations. Learn about the Python script used for analysis and discover why truly unconstrained passwords are a myth. Investigate how different constraints, such as lowercase letters, numbers, and symbols, influence password composition and security. Gain insights into balancing entropy with human behavior, the prevalence of symbols in passwords, and character set choices based on password length. Analyze first and last character patterns in passwords and explore findings from a 2 million password dump. Conclude with a discussion on password equalizers and acknowledgements for this comprehensive security research presentation.

The Effect of Constraints on the Number of Viable Permutations of Passwords

BSidesLV
Add to list