Cracking Corporate Passwords: Why Your Password Policy Suck
Authors: Rick Redman [Minga]

Date: July 2013
Publication: Passwords13 Las Vegas
Source: Currently no known Internet copy of paper.

Abstract or Summary:
All those leaked MD5s you've been cracking from Pastebin? In most cases, they are from sites that DO NOT enforce password complexity. But corporate networks DO! So, they should be harder to crack... right?

Cracking corporate passwords is no different than cracking public MD5 leaks off of pastebin. Except, it totally is. Corporate passwords are not in the same formats you are used to, they require capital letters, numbers, and/or special characters. How can we use this knowledge to our advantage? What sort of tricks are users doing when they think no one is looking? What other types of vulnerabilities is Password policy introducing? What patterns is password rotation policy creating?

You want raw data? I've got raw data! You want to see some stats? I've got those too. You want hints/tips/tricks? Yup. That too. Note: Video of presentation:

Do you have additional information to contribute regarding this research paper? If so, please email with the details.

<-- Back to Authentication Research Paper Index

[Home] [About Us] [News] [Research]

Copyright © 2019