Overview
Explore password security vulnerabilities and effective policy strategies in this 51-minute conference talk from Hack3rcon II. Delve into the shortcomings of common password practices, analyze breached databases, and learn about advanced cracking techniques. Gain insights on user password creation habits, evaluate existing policies, and discover tools for improving security. Examine topics such as brute force attacks, mask statistics, and emerging algorithms. Acquire practical knowledge on implementing robust password policies and leveraging cutting-edge tools like OCL Hashcat Lite to enhance overall system protection.
Syllabus
Intro
Who am I
Disclaimer
Agenda
Whats wrong with passwords
Data base of passwords
Password cracking
Hack databases
Password policy
Analysis
How do people make choices
Your password policy
Password policies
Bad password policies
How can we leverage this info
Brute force vs brute force
More breaches
What we can learn
Masks
Line Count Statistics
Character Set Statistics
Mask Statistics
Top 5 Breaches
Tools
Methodology
Nvidia and ATI
Statistics
Rules
OCL Hash
Examples
New Rules
New Algorithms
Oceanice
OCL Hashcat Lite
Solutions
Conclusion
Thank you
MD5 hashing