Measuring the Use and Abuse of Brain Wallets
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the security vulnerabilities of brain wallets in cryptocurrency through this BSidesLV conference talk. Delve into the methods used to measure and analyze brain wallet usage and abuse, including password cracking techniques, blockchain analysis, and draining patterns. Learn about typical key generation processes, various password cracking inputs, and the complexities involved in draining brain wallets. Examine the usage trends of brain wallets over time and compare the effectiveness of passphrases versus passwords. Gain insights into related topics such as the Large Bitcoin Collider and drains performed by Bitcoin mining pools. Presented by Ryan Castellucci and Marie Vasek, this comprehensive talk provides valuable information for cybersecurity professionals and cryptocurrency enthusiasts alike.
Syllabus
Introduction - Marie Vasek
Introduction - Ryan Castellucci
Typical RSA Key Generation
Typical Eliptic Curve key generation
Password cracking input-XKCD Phrases
Password cracking input - Phrases
Password cracking input - Standard lists
Password cracking - Process
Password cracking - Job runner read queue
Password cracking - Job runner loop
Password cracking - Example jobs
Password cracking - Random lessons learned
Blockchain analysis
Password Corpora: 3.9 trilion Candidate Passwords
Brain Wallet Usage
New Brain Walet Usage by Month
Brain Drain Time
Brain Wallet Drains over Time
Draining complexity
Draining: Passphrases vs. Passwords
Beyond Brain Walets
Large Bitcoin Collider
Drains by Bitcoin Mining Pools
Questions?
Taught by
BSidesLV
Related Courses
Early Detection through DeceptionYouTube Hack for Show, Report for Dough - Brian King
YouTube Blue Teamin on a Budget of Zero - Kyle Bubp
YouTube Windows Event Logs - Zero to Hero
YouTube Weaponizing Splunk - Using Blue Team Tools for Evil
YouTube