password cracking

SAP Password Cracking Exploits: How to Secure User Access with Pathlock
When it comes to SAP security, following password best practices is essential to ensure secure user access and prevent unauthorized permissions. However, cyber attackers frequently target SAP systems with constantly evolving tactics, ...

Password manager best practices: Why you should care about password managers’ iteration counts
The post Password manager best practices: Why you should care about password managers’ iteration counts appeared first on Click Armor ...
Busting the Myths Surrounding Password-Based Security
People have been relying on password-based security for millennia. The Roman military reportedly used what they called “watchwords” to identify soldiers on patrol. Exclusive groups and guilds used secret passwords to prove ...
Blocking Basic Dictionary Words is not Enough
For many organizations, password security comes down to simply implementing blocks on basic dictionary words from being used in the creation of a user’s password. This is not an effective way to ...
Password Blacklists: Applying the Goldilocks Principle
One of the most effective ways to increase the strength of your network’s security is to screen users’ passwords against a list of dictionary passwords and known compromised passwords. Password vulnerabilities remain ...

Security BSides London 2019, Jamie Riden’s ‘Password Cracking: The First 500 Million
Many thanks to Security BSides London for publishing their outstanding conference videos on YouTube. Permalink ...
Questions To Ask When Considering A Credential Screening Solution
Credential screening providers are critical business partners who help mitigate the risks of cyberattacks and choosing the right one can prevent exposure of additional risks. Depending on how the data is handled, ...

Cracking WPA Pre Shared Keys
Cracking WPA Pre Shared Keys This is intended to be part 2 of a previous blog (Intro to Wireless Security), which was designed to introduce people to the realm of wireless security ...

CCS Paper Part #2: Password Entropy
This is part #2 in a (mumble, cough, mumble) part serious of posts discussing the results published in the paper I co-authored on the effectiveness of passwords security metrics. Part #1 can ...

New Paper on Password Security Metrics
I'm in Chicago at the ACM CCS conference, and the paper I presented there: "Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords", is now available online.Direct Download ...