YoVDO

Abusing Password Reuse at Scale - Bcrypt and Beyond

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Risk Mitigation Courses Password Security Courses Password Hashing Courses bcrypt Courses

Course Description

Overview

Explore advanced techniques for exploiting password reuse vulnerabilities in this BSidesLV conference talk. Delve into the intricacies of password hashing, cracking methods, and the impact of mega breaches on cybersecurity. Learn about offline credential stuffing, strategies for strengthening hashes, and the balance between opportunistic and targeted attacks. Gain insights into improvements in password security, the concept of password streams, and the use of random words in password creation. Engage with a comprehensive agenda covering topics from hash fundamentals to cutting-edge password exploitation techniques, concluding with a Q&A session to address specific queries and concerns.

Syllabus

Intro
Agenda
About me
What is a hash
How do we crack passwords
Making hashes stronger
Mega breaches
Opportunity vs target
Offline credential stuffing
Improvements
Questions
Random Passwords
Password Streams
Random Words


Taught by

BSidesLV

Related Courses

Node.js: Securing RESTful APIs
LinkedIn Learning
Node: Authentication
LinkedIn Learning
Node.js: Securing RESTful APIs
LinkedIn Learning
Spring Security Tutorial
YouTube
FastAPI - The Complete Course 2024 (Beginner + Advanced)
Udemy