Share to Facebook Share to Twitter Share to LinkedIn

Attacker's Dictionary: Auditing Criminal Attacks on Passwords

WATCH THIS ON-DEMAND WEBCAST TODAY! 

Tod Beardsley will be sharing the results of a year long data collection program of opportunistic credential scanning data from Heisenberg, Rapid7’s public-facing network of low-interaction honeypots.

Instead of focusing on the type of passwords end users typically pick, this data shows what passwords opportunistic scanners are using in order to test and likely compromise Internet connected point of sale systems, kiosks, and desktop PCs which offer Remote Desktop Protocol service for remote management.

Watch the webcast to learn about:

  • Rapid7's Heisenberg Honeypots
  • Credential scanning traffic analysis
  • Password complexity and provenance
  • Advice for securing RDP endpoints
  • Considering the CFAA

 

Speakers: Tod Beardsley, Senior Security Research Manager, Rapid7 and , ,

Fill out the form to register for the webcast

Attacker's Dictionary: Auditing Criminal Attacks on Passwords

WATCH THIS ON-DEMAND WEBCAST TODAY! 

Tod Beardsley will be sharing the results of a year long data collection program of opportunistic credential scanning data from Heisenberg, Rapid7’s public-facing network of low-interaction honeypots.

Instead of focusing on the type of passwords end users typically pick, this data shows what passwords opportunistic scanners are using in order to test and likely compromise Internet connected point of sale systems, kiosks, and desktop PCs which offer Remote Desktop Protocol service for remote management.

Watch the webcast to learn about:

  • Rapid7's Heisenberg Honeypots
  • Credential scanning traffic analysis
  • Password complexity and provenance
  • Advice for securing RDP endpoints
  • Considering the CFAA

 

Speakers:
Tod Beardsley
Senior Security Research Manager
Rapid7