Upload

Loading icon Loading...

This video is unavailable.

Hack3rcon II 2011 - Martin Bos Your Password Policy Sucks

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to add SecurityTubeCons's video to your playlist.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to like SecurityTubeCons's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to dislike SecurityTubeCons's video.

Loading icon Loading...

Loading icon Loading...

The interactive transcript could not be loaded.

Loading icon Loading...

Loading icon Loading...

Ratings have been disabled for this video.
Rating is available when the video has been rented.
This feature is not available right now. Please try again later.

Published on Mar 25, 2012

This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securitytube.net

Hack3rcon II 2011 - Martin Bos Your Password Policy Sucks

Your Password Policy Sucks

Current password policies in enterprise environments are just not cutting it any more. Every day password cracking tools are becoming faster andnetwork breaches are becoming much more prevalent. In the last few years password-cracking tools have even harnessed the power of graphics processing units and field-programmable gate arrays (FPGA) making password recovery much easier and faster. This has re-established password cracking as a viable attack vector again and as a result millions of passwords have flooded the Internet recently from various password breaches. Through this presentation attendees will learn about the latest attacks, tools, and techniques employed by today's password crackers, as well as potential countermeasures that can help protect against these attacks. Anyone who has anything to do with password policy at a company should be interested in this talk. People always are, and always will be the weakest link in any network environment and password creation left up to the user can be detrimental to an organizations infrastructure.

Covered topics include:

Evolutions of password algorithms and tools
Profiling password policies
Analyzing password lists from some of the most recent high profile breaches
Establishing a better password policy
Password cracking tools, rule sets and other tricks to attack
How to conduct regular password audits

  • Category

  • License

    Standard YouTube License

Loading icon Loading...

Loading...
Working...
to add this to Watch Later

Add to