MIGHTY CRACKER Chris Bugg Chris Hamm Jon Wright Nick Baum We could consider using the Mighty Cracker Logo located in the Network Folder.

Slides:



Advertisements
Similar presentations
Password Cracking With Rainbow Tables
Advertisements

By Wild King. Generally speaking, a rainbow table is a lookup table which is used to recover the plain-text password that derives from a hashing or cryptographic.
Chapter 17: WEB COMPONENTS
Password Cracking Lesson 10. Why crack passwords?
The Cain Tool Presented by: Sagar Chivate CS 685F.
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Implementation of a Two-way Authentication Protocol Using Shared Key with Hash CS265 Sec. 2 David Wang.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Chapter 3 Passwords Principals Authenticate to systems.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
1 MySQL Passwords Password Strength and “Cracking” Presented by Devin Egan Defcon 12 - July 31, 2004 Password Strength and “Cracking” Presented by Devin.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Exploit: Password Cracking. An Overview on Password Cracking Password cracking is a term used to describe the penetration of a network, system, or resource.
Nothing is Safe 1. Overview  Why Passwords?  Current Events  Password Security & Cracking  Tools  Demonstrations Linux GPU Windows  Conclusions.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
IS 302: Information Security and Trust Week 7: User Authentication (part I) 2012.
Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.
Time-Memory tradeoffs in password cracking 1. Basic Attacks Dictionary attack: –What if password is chosen well? Brute Force (online version): –Try all.
ANTICLICK: INCREASING DESKTOP SECURITY Jason Petrey Computer Electronic Networking Dept. of Technology Eastern Kentucky University.
CIS 450 – Network Security Chapter 8 – Password Security.
Windows Vista Security David Kenney Christopher Lange.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Mark Shtern. Passwords are the most common authentication method They are inherently insecure.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Somewhere Over the Rainbow Tables Bob Weiss Password Crackers, Inc.
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
Brute Force Password Cracking and its Role in Penetration Testing Andrew Keener and Uche Iheadindu.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
Exercises Information Security Course Eric Laermans – Tom Dhaene.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.
How Safe are They?. Overview Passwords Cracking Attack Avenues On-line Off-line Counter Measures.
Protecting Your Password
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
What do you know about password? By Guang Ling Oct. 8 th,
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
CNIT 124: Advanced Ethical Hacking Ch 9: Password Attacks.
Lecture 7 Page 1 CS 236 Online Authentication CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
PZAPR Parallel Zip Archive Password Recovery CSCI High Perf Sci Computing Univ. of Colorado Spring 2011 Neelam Agrawal Rodney Beede Yogesh Virkar.
Ethical Hacking: Defeating Logon Passwords. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Operating Systems Security
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Doc.: IEEE /0899r2 Submission July2010 Dan Harkins, Aruba NetworksSlide 1 Secure PSK Authentication Date: Authors:
FERPA & Data Security:FERPA & Data Security: Passwords and Authenticators.
Over 18 yrs experience with SQL Server
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
I have edited and added material.
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Password Cracking Lesson 10.
Kiran Subramanyam Password Cracking 1.
Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé
Elections Choose wisely, this is your chance to prove if election by popular vote works or not.
Exercise: Hashing, Password security, And File Integrity
Elijah Hursey & Austin Keener Academy of Science Summer Bridge 2013
Network Penetration Testing & Defense
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

MIGHTY CRACKER Chris Bugg Chris Hamm Jon Wright Nick Baum We could consider using the Mighty Cracker Logo located in the Network Folder

Password Security Password security is important. Users Weak and/or reused passwords Developers and Admins Choose insecure storage algorithms. Mighty Cracker Show real world impact of poor password security.

OVERVIEW We made a hash cracker. Passwords are stored as hashes to protect them from intruders. Our program uses several methods to ‘crack’ those hashes. Networking Spread work to multiple machines. Cross Platform

OTHER HASH CRACKING PRODUCTS Hashcat Cain and Abel John the Ripper THC-Hydra Ophcrack Network support is rare.

WHAT IS HASHING A way to encode a password to help protect it. A mathematical one-way function. MD5 hash cf4ff726403b8a992fd43e09dd7b5717 SHA-256 hash 951e689364c979cc3aa17e6b0022ce6e4d0e3200d1c22dd68492c172241e0623

SUPPORTED HASHING ALGORITHMS Current Algorithms MD5 SHA-1 SHA-224 SHA-256 SHA-384 SHA-512

WAYS TO CRACK Cracking Modes Single User Network Mode Methods of Cracking: Brute Force Dictionary Rainbow Table GUI or Console

BRUTE FORCE Systematically checking all possible keys until the correct one is found. Worst case this would transverse the entire search space. Slowest but will always find the solution if given enough time.

DICTIONARY ATTACK List of common passwords from leaks/hacks. Many people choose common passwords Written works of Shakespeare ~66,000 words Oxford English Dictionary ~290,000 words Small dictionary = 900,000 words Medium dictionary = 14 million words Large dictionary = 1.2 billion words

RAINBOW TABLE Can’t store all possible hash/key combinations. 16 character key = 10^40th combinations 10^50th atoms on earth Rainbow tables Reduced storage. More computation. Storage can still be immense. Far faster than other methods.

RAINBOW TABLE (HOW IT WORKS) Tables are generated by repeated use of hash and reduce functions.

RAINBOW TABLE (HOW IT WORKS) Store only the initial key and final hash of each row. Middle part is easily reproducible. Storage requirements divided by the width of the table.

GUI DEMO

*^n1gh7^m4r3^*[*123*] Stolen in 2009 data breach Don’t reuse passwords.

DEVELOPMENT Requires Python 2.7.X GUI Requires wxPython Pycharm Linux, OSX 10.6+, Windows 7+ Git

WHY USE PYTHON? ♥ People love Python ♥ Easy to learn the basics and get going. Something new compared to what we have learned. C/C++, Java, C#, Haskell, OCaml, MySQL, Perl

CHALLENGES Global Interpreter Lock (GIL) in Python Threads Run Serially, Not in Parallel Caused many issues for networking Solution was Python’s multiprocessing library Pickling wxPython objects are not pickleable

CHALLENGES CONTINUED Windows support manager conflicts fork vs. spawn processes pickling issues Graphics Library Tkinter - can’t handle complicated layouts Solution was wxPython library Everyone knows “a little” python In-depth help was hard to find

FUTURE PLANS Crash recovery “Pause” ability GPU Support Real-time Client Monitoring System for Server Re-Implement in C++ More algorithms LM (Windows ME and before) NTLM (Windows XP → 8.1)

DEFEATING THE MIGHTY CRACKER Strong storage algorithms bcrypt, scrypt Use long (12+ character) random passwords Don’t reuse passwords Two factor authentication Password manager KeyFree, LastPass

Thank You Ruben Gamboa Jim Ward StackOverflow The Internet

QUESTIONS?

References GRC’s Password Haystack - "Rainbow table1" by Dake - Dake. Licensed under CC BY-SA 2.5 via Wikimedia Commons - g size.jpg os_2-d5keldy.png