9
Mark Shtern

Mark Shtern. Passwords are the most common authentication method They are inherently insecure

Embed Size (px)

Citation preview

Page 1: Mark Shtern. Passwords are the most common authentication method They are inherently insecure

Mark Shtern

Page 2: Mark Shtern. Passwords are the most common authentication method They are inherently insecure

Passwords are the most common authentication method

They are inherently insecure

Page 3: Mark Shtern. Passwords are the most common authentication method They are inherently insecure

• Human generated passwords• Come from a small domain• Easy to guess – dictionary attacks

• Stronger passwords• Computer generated or verified• Not user friendly • Hard to remember

Page 4: Mark Shtern. Passwords are the most common authentication method They are inherently insecure

Physical Access Offline password cracking Online password cracking

Page 5: Mark Shtern. Passwords are the most common authentication method They are inherently insecure

Boot using Linux bootable CD Mount system drive Reset Administration Password (Windows:

chntpwd; Linux modify shadow file)

Page 6: Mark Shtern. Passwords are the most common authentication method They are inherently insecure

Collect password hashes Crack passwords

Page 7: Mark Shtern. Passwords are the most common authentication method They are inherently insecure

Eavesdropping (Sniffing) Password file

Windows – SAM,NTDS.dit file (pwdump[2-6] and fgdump)

Linux – shadow file (unshadow) Memory Dump (debug tools: WinDgb, gdb), System

calls (APImonitor, strace) SQL database, configuration file Source code

Page 8: Mark Shtern. Passwords are the most common authentication method They are inherently insecure

Types Brute Force Dictionary Hybrid Rainbow

The most popular crackers Windows: Ophcrack, Cain & Abel, LCP Linux: John the Ripper (john)

Page 9: Mark Shtern. Passwords are the most common authentication method They are inherently insecure

Eavesdropping: Encrypt the channel, e.g. using SSL or SSH

Offline dictionary attacks: Limit access to password hashes, strong passwords, password lifetime, use salt

Online dictionary attacks: Delayed answers, strong passwords, account lockouts