Password Intelligence Project - Advanced Password Recovery and Modern Mitigation Strategies
via YouTube
Overview
Syllabus
DerbyCon 2013
Objectives
Recent Enterprise Password Fails
The Historic Password Problem
How Modern Passwords Work
How Password Complexity Works
How Password Length Works
How Passwords Are Compromised
Obtain and Dump Windows Credentials into Password Cracking Program
Inherent Password Problems
Recovery Sequencing
Dictionary Attack Dynamics
Dictionary Recovery Tricks
Brute Force Recovery (10)
Brute Force Lowercase (26)
Brute Force Advance Techniques
Removing Restricted Password Lengths
Reducing the key Space "Wheel of Fortune" Recovery Methodology . abcdefghijklmnopqrstuvwxyz - 8 Characters - 217,180,147,158
Presumed vs. Guaranteed Key Space Complexity
Brute Force Password Resistance
Length Trumps Complexity
Establish Multiple Passwords
Consider a Password Vault Service
Fixing the Problem
Salt and Encrypt Stored Credentials
Compromise Detection Strategies
Strong Multi-Factor Authentication 3 Types of Authentication
2Step != 2Factor Authentication
Hard Tokens -Strongest Most Expensive Protection
Soft Tokens - Good Protection at a Reasonable Price
2FA Application Development
The Future of 2FA?
Conclusion: 2FA - Knowledge is Power!