09:45 |
Gosney,
Thorsheim
|
Welcome to Passwords13 |
10:00 |
Steube
|
Advanced Password Cracking: Hashcat Techniques for the Last 20% |
10:30 |
Kacherginsky
|
Smarter Password Cracking with PACK |
11:30 |
Fousekis
|
Markov Chains & Other Statistical Password Attacks |
12:00 |
Goldberg
|
Defining Password Strength |
12:30 |
Steele
|
Gavel: Password Justice |
13:00 |
Steube
|
Optimizing the Computation of Hash Algorithms as an Attacker |
14:00 |
Marshall
|
A Review of Real World Security Questions & Answers |
14:30 |
Thomas
|
Using HSMs to Secure Password Databases |
15:00 |
Belenko,
Weinstein
|
Stronger Identity Protection via Mobile Devices |
15:30 |
Graves
|
How To Screw Up Password Hashing: Secrets of a Password Cracker Author |
16:00 |
Spacek
|
Hash, store, ..., profit! |
16:30 |
Aumasson
|
The Password Hashing Competition: Motivation, Challenges, and Organization |
10:00 |
Thorsheim
|
Thorsheim - TBD |
10:30 |
Redman
|
Cracking Corporate Passwords: Why Your Password Policy Sucks |
11:30 |
Bongard
|
De-anonymizing Members of French Political Forums |
12:00 |
Graham
|
Common Password Cracking Misconceptions |
13:00 |
Werby
|
Crunching the Top 10,000 Websites' Password Policies and Controls |
14:00 |
Goldberg
|
Playing Defence with PBKDF2 |
14:30 |
Goodman
|
Bypassing Strong Authentication... With Passwords?! |
15:30 |
Preuss
|
Utilizing Paste Services for Fun and Hashes |
16:00 |
Dustin,
Young
|
Password Cracking, From "abc123" to "thereisnofatebutwhatwemake" |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.