0% found this document useful (0 votes)
35 views

Password Presentation

The document discusses password security and recommendations for strong passwords. It explains that passwords can be cracked using methods like dictionary attacks, brute force attacks, and GPU cracking. Strong passwords are recommended, such as ones that are at least 11 characters long and include a mix of uppercase, lowercase, numbers and symbols. The use of multiple unique passwords and multifactor authentication is also advised for better security. The document also reviews popular password managers like 1Password, LastPass, and KeePass that can generate and store strong, unique passwords across devices.

Uploaded by

Risabh Shukla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views

Password Presentation

The document discusses password security and recommendations for strong passwords. It explains that passwords can be cracked using methods like dictionary attacks, brute force attacks, and GPU cracking. Strong passwords are recommended, such as ones that are at least 11 characters long and include a mix of uppercase, lowercase, numbers and symbols. The use of multiple unique passwords and multifactor authentication is also advised for better security. The document also reviews popular password managers like 1Password, LastPass, and KeePass that can generate and store strong, unique passwords across devices.

Uploaded by

Risabh Shukla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

You

 and  Your  Passwords  


Why  Passwords?  
Threat  -­‐  Cracking  Passwords  
d131dd02c5e
d131dd02c5e 6eec4693d9a
Password Guess

HASH
6eec4693d9a 0698aff95c
0698aff95c

Password File

Password  Type   Using  the  CPU   Using  the  GPU  


6  char  (no  spec  chars)   1  hour  30  sec   4  seconds  
7  char  (no  spec  chars)   4  days   17  minutes  30  seconds  
7  char  (spec  chars)   75  days   7  hours  
9  char  (spec  chars)   43  years   48  days  
Methods  to  Compromise    
Accounts/Passwords  
Defense  

(passphrases)  

MulL-­‐factor  

Host-­‐based  
encrypLon  
passwords  
Password  A6ack  

EducaLon  
Password  

Network  
lockouts  
Account  
changes  

security  
Regular  
Longer  
Password  Cracking  
• DicLonary  ASack      Ÿ  
• Brute  Force   ✔   ✔   ✔   ✔  
• Rainbow  Tables            
• GPU  Cracking  
Password  Sharing   ✔   ✔  
Phishing/Social  Engineering   ✔   ✔  
Man-­‐in-­‐the-­‐Middle  ASack   ✔   ✔   ✔  
Network  Sniffing   ✔   ✔   ✔   ✔   ✔  
Keylogger   ✔*
✔  

*(unless  digital  cert)  


 
Look,  a  Demo!  
RecommendaLons  
•  Not  just  one  strong  passwords,  but  mulLple  
strong  passwords  
•  Password  Escrow  
•  MulLfactor  
What’s  a  Strong  Password?    
•  8  characters   •  11  characters  
•  Mix  of  upper,  lower,   •  One  each  of  upper,  
numbers,  symbols   lower,  numbers,  
symbols  
•  Change  regularly  
•  MulLple  passwords!  
 
Password  Escrow  –  1Password  
1Password  
Pros   Cons  
•  MulLplacorm  and   •  Cost  
mulLbrowser    
•  Password  generator  
•  Password  history  
•  Sync  with  mobile  devices  
Password  Escrow  –  LastPass  
LastPass  
Pros   Cons  
•  Free  and  Pay  versions   •  Stores  in  the  cloud  
•  MulLplacorm  and   (encrypted)  
mulLbrowser  
•  Password  generator  
•  Sync  with  mobile  devices  
Password  Escrow  –  Keepass  
KeePass  
Pros   Cons  
•  Free     •  May  require  different  
•  MulLplacorm  and   installaLons  for  different  
mulLbrowser   OS’s  
•  Password  generator   •  May  require  some  
•  Sync  with  mobile  devices   advanced  work  to  sync  with  
mobile  devices  
MulLfactor  

You might also like