mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-27 14:54:05 -06:00
vault backup: 2022-10-10 09:57:45
This commit is contained in:
parent
a4c0811628
commit
a9812fedfc
@ -17,8 +17,62 @@ tags:
|
||||
- use statistical distribution of passwords then use this to generate guesses
|
||||
|
||||

|
||||

|
||||
- can generate passwords that are likely to be used
|
||||
- also based off previous passwords
|
||||
- passwords can be guessed in less attempts
|
||||
- need to update our rules - e.g., how many guesses makes an attempt likely to be suspicious
|
||||
-
|
||||
|
||||
- new password generate, which also provides real world indicator of password strength
|
||||
- faster password guessing
|
||||
- hackers will get in faster
|
||||
- need to be a step ahead of this
|
||||
- insight into strong but unused passwords
|
||||
- passwords get close and closer to those typically used
|
||||
|
||||
## password "guessing"
|
||||
- gets faster as machines get faster (Moore's law)
|
||||
- machine learning reduces number of trials further by learning distributions of passwords
|
||||
|
||||
- useful for us
|
||||
- even if we didn't do this research the hackers would
|
||||
- use passgan to detect guesses which may have come from passgan
|
||||
- can analyse the source of guesses for suspicous stuff e.g., ip, location etc
|
||||
- can analyse data from antivirus programs
|
||||
|
||||
- useful for hackers
|
||||
- hackers can conquer our strategies
|
||||
|
||||
## steganography
|
||||
- hiding secret messages in a medium that is not meant to be secret (e.g., image, audio, video)
|
||||
- used to hide content and reduce suspicion e.g., in forensic investigation
|
||||
- hidden message usually encryted but not in the sense of cryptography
|
||||
- goal is to decieve
|
||||
|
||||

|
||||
- embed noise into images
|
||||
|
||||
### signal to noise
|
||||
- most signals contain noise e.g., static
|
||||
- noise carries info as the least significant bits in value
|
||||
- hiding data in an image in the least significant bits will be visually percieved as noise
|
||||
|
||||
### e.g., derek uphams JSteg
|
||||

|
||||
|
||||
### stegnalysis
|
||||
- detecting hidden content
|
||||
- usually visually undetectable
|
||||
|
||||
how
|
||||
- analyse DCT distributions
|
||||
- 
|
||||
|
||||
F5 steganographic algorithm
|
||||
- developed to fool analysis of dct distributions
|
||||
-
|
||||
|
||||
new password generate, which also provides real world indicator of password st
|
||||
|
||||
# bigger issues
|
||||
|
||||
|
||||
Loading…
Reference in New Issue
Block a user