Главная
Study mode:
on
1
Intro
2
Attack vectors
3
Online vs offline attacks
4
The limit of iterative hashing
5
Goals of a different hashing function
6
What is Blind Hashing
7
Pseudocode
8
Attacker analysis
9
Additional challenges
10
Questions
11
Password game
12
Offline attacks
13
How to scale
Description:
Explore the concept of Blind Hashing in this 30-minute conference talk by Jeremy Spilman at BSidesLV 2015. Delve into password security, examining attack vectors and the differences between online and offline attacks. Understand the limitations of iterative hashing and discover the goals of alternative hashing functions. Learn about the Blind Hashing technique, its pseudocode implementation, and analyze potential attacker strategies. Discuss additional challenges in password security and participate in a password game to reinforce concepts. Gain insights into offline attacks and strategies for scaling password protection systems.

Blind Hashing

BSidesLV
Add to list