Elijah Hursey & Austin Keener Academy of Science Summer Bridge 2013

Slides:



Advertisements
Similar presentations
Password Cracking With Rainbow Tables
Advertisements

By Wild King. Generally speaking, a rainbow table is a lookup table which is used to recover the plain-text password that derives from a hashing or cryptographic.
Lecture 5: Cryptographic Hashes
GOPAS TechEd 2012 PKI Design Ing. Ondřej Ševeček | GOPAS a.s. |
1 Cache and Caching David Sands CS 147 Spring 08 Dr. Sin-Min Lee.
Password Cracking Lesson 10. Why crack passwords?
Computer Security Set of slides 5 Dr Alexei Vernitski.
Jeff Bilger - CSE P 590TU - Winter 2006 The Role of Cryptography in Combating Software Piracy.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Presentation on Black Hat Windows 2000 Security Conference Analysis of Microsoft Office password protection system, and survey.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.
Time-Memory tradeoffs in password cracking 1. Basic Attacks Dictionary attack: –What if password is chosen well? Brute Force (online version): –Try all.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
Mark Shtern. Passwords are the most common authentication method They are inherently insecure.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
Somewhere Over the Rainbow Tables Bob Weiss Password Crackers, Inc.
Brute Force Password Cracking and its Role in Penetration Testing Andrew Keener and Uche Iheadindu.
6fb52297e004844aa81be d50cc3545bc Hashing!. Hashing  Group Activity 1:  Take the message you were given, and create your own version of hashing.  You.
How Safe are They?. Overview Passwords Cracking Attack Avenues On-line Off-line Counter Measures.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
What do you know about password? By Guang Ling Oct. 8 th,
Date : 2/12/2010 Web Technology Solutions Class: Adding Security and Authentication Features to Your Application.
CNIT 124: Advanced Ethical Hacking Ch 9: Password Attacks.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Password cracking Patrick Sparrow, Matt Prestifillipo, Bill Kazmierski.
Password. On a Unix system without Shadow Suite, user information including passwords is stored in the /etc/passwd file. Each line in /etc/passwd is a.
Operating Systems Security
Distributed Computing Projects. Find cures for diseases like Alzheimer's and Parkinson's by analyzing the ways proteins develop (protein.
Module 4 Password Cracking
E-Commerce and Security Dr. John P. Abraham Professor University of Texas Pan American.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Security Operations Chapter 11 Part 3 Pages 1279 to 1309.
Understanding Security Policies Lesson 3. Objectives.
MIGHTY CRACKER Chris Bugg Chris Hamm Jon Wright Nick Baum We could consider using the Mighty Cracker Logo located in the Network Folder.
Password Cracking COEN 252 Computer Forensics. Social Engineering Perps trick Law enforcement, private investigators can ask. Look for clues: Passwords.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
Ethan Mancil Jubal Martin Summer Bridge 2013, Appalachian State University.
Practical and Theoretical Limits In Computing Aleksander Ratzloff and Zachary Andrews.
Understanding Security Policies
Dark Energy and Dark Matter
COEN 252 Computer Forensics
Using Kinect for educational purposes
Taxol and the Pacific Yew Tree
Internet Privacy Tamarcus Garcia, Doug Stokes
I have edited and added material.
Jason Ewing Troy Behmer
Internet Censorship Hazards & Benefits
Olbers’ Paradox Sam Migirditch
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Password Cracking Lesson 10.
McDonald’s Used Oil to McDiesel
An Analysis of Past and Future Space Craft Launches
IIT Indore © Neminah Hubballi
Asynchronous Cryptology: Implementations and Applications
Networks Encryption.
CS 465 PasswordS Last Updated: Nov 7, 2017.
How do I find my PDF password with simple operations.
Free RAR password recovery--iSunshare RAR Password Genius
Kiran Subramanyam Password Cracking 1.
Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé
Operating Systems Tasks 17/02/2019.
C021TV-I2-S2.
Exercise: Hashing, Password security, And File Integrity
Network Penetration Testing & Defense
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

Elijah Hursey & Austin Keener Academy of Science Summer Bridge 2013 Password Cracking Elijah Hursey & Austin Keener Academy of Science Summer Bridge 2013

Contents: Encryption Brute Force Rainbow Tables Dictionary Cracking

Encryption: Passwords are stored as ‘hash’ Hash is an encrypted version of your password MD5 and SHA are popular but vulnerable B-crypt much stronger encryption Protection depends on encryption software as well as your individual password

Brute Force: Every possible combination of letters, symbols, and numbers Effective but with longer passwords may take a very long time Process is accelerated with better hardware. Can also be simplified with the use of rainbow tables

Dictionary Cracking: Modified form of Brute force Uses words instead of random combinations These attacks can be countered by using numbers and symbols

Rainbow Tables: Does not store all possible combinations Combinations stored in chains Only beginning and end of chain are stored This method of storage allows for faster cracking speeds without needing to have terabytes of storage space to store every possible combination

Acknowledgements: Dr. Alexander D. Schwab Dr. Jennifer Burris Mr. David Sitar Dr. Cindy Norris Dr. Rahman Tashakkori Appalachian State University Academy of Science Summer Bridge Program National Science Foundation

References: "Mieux coder." Mieux coder RSS. 27 July 2013 <http://www.mieuxcoder.com/2008/01/02/rainbow-tables/>. "OPHCRACK (the time-memory-trade-off-cracker)." Ophcrack. 27 July 2013 <http://lasecwww.epfl.ch/~oechslin/projects/ophcrack/>.