Christiaan008 asked:

Speakers: RYAN REYNOLDS MANAGER, SECURITY AND PRIVACY AT CROWE HORWATH LLP JONATHAN CLAUDIUS SECURITY RESEARCHER, SPIDERLABS RESEARCH, TRUSTWAVE The …

Advertisement
Share →

2 Responses to DEFCON 20: Stamp Out Hash Corruption! Crack All The Things!

  1. Stuart 陶明瀚 says:

    good talk, thank you.

  2. Lars Nielsen says:

    I wonder if the data++ section in the slides are proper hashes that can be
    cracked too. If so, maybe a pattern for password changes could be
    determined for the user so you’d have a better chance of guessing new ones
    if you ever needed to get into their account again.

Leave a Reply

Your email address will not be published. Required fields are marked *

* Copy This Password *

* Type Or Paste Password Here *

Looking for something?

Use the form below to search the site:


Still not finding what you're looking for? Drop us a note so we can take care of it!

Set your Twitter account name in your settings to use the TwitterBar Section.