As much as the IT & Security folks want to deny it, in the real-world passwords are frequently reused. And what's even scarier is often times these passwords cross over between a user's regular account to an administrative account (think network devices, backup solutions, etc).
If you could create a matrix displaying the different passwords by person vs. services where this password is reused, the results would be shocking to enterprise security teams. We get it though, managing such a plethora of passwords and their associated accounts becomes a mighty challenge. But there has to be a superior way, right?
Watch this on-demand webinar with renowned hacker and security expert, Paula Januszkiewicz, who shares a story about "the little password that could", how it ended up in a place where it shouldn't, and how its reuse threatened the integrity of an entire organization.
During the webinar Januszkiewicz thoroughly demos how to:
- Extract the password from different solutions for the purpose of password reuse verification
- Perform the dictionary attacks against the certain solutions
- Find the password / hash duplicates in the NTDS.dit
Paula Januszkiewicz, CEO CQURE, penetration tester and mentor of CQURE Academy. Paula is also an Enterprise Security MVP and trainer (MCT) and Microsoft Security Trusted Advisor. She is also a top speaker at many well-known conferences including TechEd North America, TechEd Europe, TechEd Middle East, RSA, TechDays, CyberCrime, etc., and is often rated as number-one speaker.
Paula is engaged as a keynote speaker for security related events and she writes articles on Windows Security. Her company CQURE has now 3 locations New York, Dubai and Warsaw. Paula has conducted hundreds of IT security audits and penetration tests, including those for governmental organizations, she is a renowned security consultant. Her distinct specialization is related to Microsoft security solutions in which she holds multiple Microsoft certifications, besides being familiar with and possessing certifications in other related technologies and operating systems. Paula is passionate about sharing her knowledge with others.
In private, she enjoys researching new technologies, which she converts to authored trainings. She wrote a book about Threat Management Gateway 2010, and is working on her next book. She has access to a source code of Windows! Every year she makes over 200 flights (2013 - 248) to gain more and more experience, provides penetration tests and consults Customers about how to secure their infrastructures. Her favorite saying is: "I have a tool for that!"