Overview
Syllabus
Intro
Password manager poll
Why hackers are interested in this
Financial fraud theft
Account takeover
Virtual currency
Spam
Twitter
Other breaches
Techniques
Credential stuffing
Adobe breach
Great website hack
Username database
Credentials
Email verification
Password dump
Code level vulnerabilities
Password managers
Ways to protect yourself
Strong login process
U2F
Phone apps
Brute force attacks
Balancing act
Rate limiting
Threat intelligence
Volume of attempts
JavaScript
Browser Fingerprint
User profiles
Sentry mba
Netflix
Spotify
CAPTCHAs
WTF
Local deployment
Credential dump database
Credential dump files
Resources
Taught by
LASCON