Password Topology Histogram Wear-Leveling: PathWell Approach - Rick Redman

Password Topology Histogram Wear-Leveling: PathWell Approach - Rick Redman

via YouTube Direct link

Recent Trends: Attacker Advantage

4 of 20

4 of 20

Recent Trends: Attacker Advantage

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Password Topology Histogram Wear-Leveling: PathWell Approach - Rick Redman

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Classic Password Cracking
  3. 3 Classic Defenses
  4. 4 Recent Trends: Attacker Advantage
  5. 5 Naive Brute Force
  6. 6 Selective Brute Force-Password Patterns
  7. 7 Predictable Password Topologies
  8. 8 Sample Organization #1
  9. 9 How about harder passwords?
  10. 10 Topology-Related Defenses
  11. 11 PathWell: Password Topology Histogram Wear- Leveling
  12. 12 Topology Wear-Leveling Effectiveness
  13. 13 Minimum Topology Change
  14. 14 Measuring Topology Change: Levenshtein Distance
  15. 15 Cost of Topology-Related Defense: Keyspace Reduction
  16. 16 PathWell Audit Mode
  17. 17 PathWell Enforcement Mode
  18. 18 Example Configurations
  19. 19 PathWell: Next Steps for the Project
  20. 20 Free Topologies

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.