Presenter Photo

As much as the IT & Security folks want to deny it, in the real-world passwords are frequently reused. And what's even scarier is often times these passwords cross over between a user's regular account to an administrative account (think network devices, backup solutions, etc).

If you could create a matrix displaying the different passwords by person vs. services where this password is reused, the results would be shocking to enterprise security teams. We get it though, managing such a plethora of passwords and their associated accounts becomes a mighty challenge. But there has to be a superior way, right?

Watch this on-demand webinar with renowned hacker and security expert, Paula Januszkiewicz, who shares a story about "the little password that could", how it ended up in a place where it shouldn't, and how its reuse threatened the integrity of an entire organization.

During the webinar Januszkiewicz thoroughly demos how to:

  • Extract the password from different solutions for the purpose of password reuse verification
  • Perform the dictionary attacks against the certain solutions
  • Find the password / hash duplicates in the NTDS.dit