Mark Shtern. Passwords are the most common authentication method They are inherently insecure.
-
Upload
louisa-hood -
Category
Documents
-
view
217 -
download
0
Transcript of Mark Shtern. Passwords are the most common authentication method They are inherently insecure.
![Page 1: Mark Shtern. Passwords are the most common authentication method They are inherently insecure.](https://reader035.fdocuments.us/reader035/viewer/2022062519/56649eab5503460f94bb1708/html5/thumbnails/1.jpg)
Mark Shtern
![Page 2: Mark Shtern. Passwords are the most common authentication method They are inherently insecure.](https://reader035.fdocuments.us/reader035/viewer/2022062519/56649eab5503460f94bb1708/html5/thumbnails/2.jpg)
Passwords are the most common authentication method
They are inherently insecure
![Page 3: Mark Shtern. Passwords are the most common authentication method They are inherently insecure.](https://reader035.fdocuments.us/reader035/viewer/2022062519/56649eab5503460f94bb1708/html5/thumbnails/3.jpg)
• Human generated passwords• Come from a small domain• Easy to guess – dictionary attacks
• Stronger passwords• Computer generated or verified• Not user friendly • Hard to remember
![Page 4: Mark Shtern. Passwords are the most common authentication method They are inherently insecure.](https://reader035.fdocuments.us/reader035/viewer/2022062519/56649eab5503460f94bb1708/html5/thumbnails/4.jpg)
Physical Access Offline password cracking Online password cracking
![Page 5: Mark Shtern. Passwords are the most common authentication method They are inherently insecure.](https://reader035.fdocuments.us/reader035/viewer/2022062519/56649eab5503460f94bb1708/html5/thumbnails/5.jpg)
Boot using Linux bootable CD Mount system drive Reset Administration Password (Windows:
chntpwd; Linux modify shadow file)
![Page 6: Mark Shtern. Passwords are the most common authentication method They are inherently insecure.](https://reader035.fdocuments.us/reader035/viewer/2022062519/56649eab5503460f94bb1708/html5/thumbnails/6.jpg)
Collect password hashes Crack passwords
![Page 7: Mark Shtern. Passwords are the most common authentication method They are inherently insecure.](https://reader035.fdocuments.us/reader035/viewer/2022062519/56649eab5503460f94bb1708/html5/thumbnails/7.jpg)
Eavesdropping (Sniffing) Password file
Windows – SAM,NTDS.dit file (pwdump[2-6] and fgdump)
Linux – shadow file (unshadow) Memory Dump (debug tools: WinDgb, gdb), System
calls (APImonitor, strace) SQL database, configuration file Source code
![Page 8: Mark Shtern. Passwords are the most common authentication method They are inherently insecure.](https://reader035.fdocuments.us/reader035/viewer/2022062519/56649eab5503460f94bb1708/html5/thumbnails/8.jpg)
Types Brute Force Dictionary Hybrid Rainbow
The most popular crackers Windows: Ophcrack, Cain & Abel, LCP Linux: John the Ripper (john)
![Page 9: Mark Shtern. Passwords are the most common authentication method They are inherently insecure.](https://reader035.fdocuments.us/reader035/viewer/2022062519/56649eab5503460f94bb1708/html5/thumbnails/9.jpg)
Eavesdropping: Encrypt the channel, e.g. using SSL or SSH
Offline dictionary attacks: Limit access to password hashes, strong passwords, password lifetime, use salt
Online dictionary attacks: Delayed answers, strong passwords, account lockouts