CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

Password Cracking Lesson 10. Why crack passwords?
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
Password CrackingSECURITY INNOVATION © Sidebar – Password Cracking We have discussed authentication mechanisms including authenticators. We also.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
1 Ola Flygt Växjö University, Sweden Intruders.
Anti-Hacker Tool Kit Password Cracking Brute-Force Tools Chapter 9
Chapter 3 Passwords Principals Authenticate to systems.
Password Attacks Mike. Guessing Default Passwords Many applications and operating systems include built-in default passwords. Lazy administrators Database.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Linux Security.
Mastering Windows Network Forensics and Investigation Chapter 14: Other Audit Events.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
CSE 461 INTEGRITY CHECKING AND HASHING. JOKE: TELNET.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
FORESEC Academy FORESEC Academy Security Essentials (II)
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
CIS 450 – Network Security Chapter 8 – Password Security.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Mark Shtern. Passwords are the most common authentication method They are inherently insecure.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
Lecture 5: User Accounts & Directory Service Instructor: Dr. Najla Al-Nabhan
Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.
1 Lect. 20. Identification. 2  Entity Authentication (Identification) Over the communication network, one party, Alice, shows to another party, Bob,
Password Cracking By Allison Ramondetta & Christine Giordano.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Chapter 9 Intruders.
Password cracking Patrick Sparrow, Matt Prestifillipo, Bill Kazmierski.
Password. On a Unix system without Shadow Suite, user information including passwords is stored in the /etc/passwd file. Each line in /etc/passwd is a.
System Hacking (Gaining Access) Additions to CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
Authentication (and Unix Password Security). 2 Authentication means to establish proof of identity. We will look at these three methods of authentication.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
CSCE 201 Identification and Authentication Fall 2015.
TANNENBAUM: 9 SECURITY (FOR THE LITTLE FUR FAMILY)
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
Honeywords: Making Passwords-Cracking Detectable Ari Jules, Ronald L. Rivest Presented by: Karthik Padullaparty | kpad470 October 14, Karthik Padullaparty.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Encryption Techniques. The table below shows what DES (Data Encryption Standard ) key sizes are needed to protect data from attackers with different time.
Chapter Six: Authentication 2013 Term 2 Access Control Two parts to access control Authentication: Are you who you say you are?  Determine whether access.
Password Cracking COEN 252 Computer Forensics. Social Engineering Perps trick Law enforcement, private investigators can ask. Look for clues: Passwords.
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
Chapter 9 Intruders.
Chapter 6 – Users, Groups, and Permissions
Penetration Testing Offline Password Cracking
I have edited and added material.
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Password Cracking Lesson 10.
Adding New Users, Storage, File System
Chapter 27: System Security
LINUX SECURITY Dongmei Wu ID: /25/00.
Chapter 9 Intruders.
Operating System Security
Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé
Adding New Users.
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

CIS 450 – Network Security Chapter 10 – UNIX Password Crackers

Easiest way to identify weak passwords in a UNIX environment is to utilize UNIX password cracker tools Where are Passwords stored in UNIX? Non-sensitive information in /etc/passwd, which is world readable The hashed passwords stored in /etc/shadow with only those with root access can read the shadow file

How Does UNIX Encrypt Passwords Uses an encryption algorithm called Crypt to encrypt its passwords ml ml Uses DES, Blowfish, and MD5 algorithmsDES BlowfishMD5

UNIX Password Cracking Programs Master List er&key=passhack&txt=Unix%20password%20crackers er&key=passhack&txt=Unix%20password%20crackers Crack John the Ripper XIT Slurpie Similar to John The Ripper and Crack except it is designed to run on multiple computers simultaneously, creating a distributed password cracking attack.

Protecting Against UNIX Password Crackers Have a strong password policy – pages Use shadow files – page 378 Use one-time passwords – passwords change every time use logs on – page 379 Use biometric authentication – authenticates a user based on human factors – page 380 Use UNIX Password Programs to enforce strong passwords General information – page Passwd+ Npasswd Epasswd

Protecting Against UNIX Password Crackers Audit access to key files – normally only way to detect the attack is to catch them when the password or shadow file is being accessed - page 381 Scan for cracking tools – page 381 Keep inventory of active accounts – company should have a policy for checking active accounts & removing accounts that are no longer active – page 381 Limit who has access to root – page 382