The Little Password That Could: How a Reused Password Could Dismantle Your Entire Enterprise
About this Webinar
As much as the IT & Security folks want to deny it, in the real-world passwords are frequently reused. And what’s even scarier is often times these passwords cross over between a user’s regular account to an administrative account (think network devices, backup solutions, etc).
If you could create a matrix displaying the different passwords by person vs. services where this password is reused, the results would be shocking to enterprise security teams. We get it though, managing such a plethora of passwords and their associated accounts becomes a mighty challenge. But there has to be a superior way, right?
Watch this on-demand webinar with renowned hacker and security expert, Paula Januszkiewicz, who shares a story about “the little password that could”, how it ended up in a place where it shouldn’t, and how its reuse threatened the integrity of an entire organization.
During the webinar Januszkiewicz thoroughly demos how to:
- Extract the password from different solutions for the purpose of password reuse verification
- Perform the dictionary attacks against the certain solutions
- Find the password / hash duplicates in the NTDS.dit