Network Penetration Testing & Defense

Slides:



Advertisements
Similar presentations
Password Cracking With Rainbow Tables
Advertisements

Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
The Cain Tool Presented by: Sagar Chivate CS 685F.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
With a Penetration Tester’s Toolkit.  Background  What to Expect  Topics  Demonstrations.
Password CrackingSECURITY INNOVATION © Sidebar – Password Cracking We have discussed authentication mechanisms including authenticators. We also.
Cryptography and Network Security Chapter 20 Intruders
Chapter 3 Passwords Principals Authenticate to systems.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
CSE 461 INTEGRITY CHECKING AND HASHING. JOKE: TELNET.
Nothing is Safe 1. Overview  Why Passwords?  Current Events  Password Security & Cracking  Tools  Demonstrations Linux GPU Windows  Conclusions.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
WARNING! Sample chapter -Materials in this sample chapter is selected advanced penetration from
Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
VPN AND SECURITY FLAWS Rajesh Perumal Clemson University.
What Password Cracking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer.
IS 302: Information Security and Trust Week 7: User Authentication (part I) 2012.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
The Truth About Protecting Passwords COEN 150: Intro to Information Security Mary Le Carol Reiley.
Chapter 4 System Hacking: Password Cracking, Escalating Privileges, & Hiding Files.
Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.
System Hacking Techniques
CIS 450 – Network Security Chapter 8 – Password Security.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Windows Vista Security David Kenney Christopher Lange.
Mark Shtern. Passwords are the most common authentication method They are inherently insecure.
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
System Hacking Active System Intrusion. Aspects of System Hacking System password guessing Password cracking Key loggers Eavesdropping Sniffers Man in.
6fb52297e004844aa81be d50cc3545bc Hashing!. Hashing  Group Activity 1:  Take the message you were given, and create your own version of hashing.  You.
Introduction to Information Security Network Traversal nirkrako at post.tau.ac.il itamargi at post.tau.ac.il.
October 8, 2002Bob Mahoney, MIT Network Security Team 1 Windows Security: Recent Threats and Responses (and whatever else comes up :-) Information Systems.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.
How Safe are They?. Overview Passwords Cracking Attack Avenues On-line Off-line Counter Measures.
Penetration Testing 101 (Boot-camp)
What do you know about password? By Guang Ling Oct. 8 th,
CNIT 124: Advanced Ethical Hacking Ch 9: Password Attacks.
Password cracking Patrick Sparrow, Matt Prestifillipo, Bill Kazmierski.
Ethical Hacking: Defeating Logon Passwords. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Module 4 Password Cracking
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
MIGHTY CRACKER Chris Bugg Chris Hamm Jon Wright Nick Baum We could consider using the Mighty Cracker Logo located in the Network Folder.
Password Cracking COEN 252 Computer Forensics. Social Engineering Perps trick Law enforcement, private investigators can ask. Look for clues: Passwords.
Understanding Passwords ● Jonathan Schipp ● Dubois County Linux User Group ● Nov 7 th 2010 ● jonschipp (at) gmail.com.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
Penetration Testing Exploiting I: Password Cracking
CIT 480: Securing Computer Systems
COEN 252 Computer Forensics
I have edited and added material.
Passwords Everywhere Ing. Ondřej Ševeček | GOPAS a.s. |
Password Cracking Lesson 10.
Ethical Hacking: Hacking GMail
Information Assurance Day Course
CS 465 PasswordS Last Updated: Nov 7, 2017.
Linux Exploitation Tools
Password Cracking 101 Jamie Maguire Thank you all for coming
روش ساخت ارتباط PPPoE در سیستم عامل Windows 7
Kiran Subramanyam Password Cracking 1.
Cyber Operation and Penetration Testing Online Password Cracking Cliff Zou University of Central Florida.
Information Security is Broken
Exercise: Hashing, Password security, And File Integrity
Buffer Overflow Slide Set #7 Textbook Chapter 10 Clicker Questions
Access Control Slide Set #4 Textbook Chapter 4 Clicker Questions
Elijah Hursey & Austin Keener Academy of Science Summer Bridge 2013
Penetration Testing & Network Defense
Penetration Testing & Network Defense
Engineering Secure Software
Presentation transcript:

Network Penetration Testing & Defense Password Attacks                     Peer Instruction Questions for Cybersecurity: Pentesting by William E. Johnson, Allison Luzader, Irfan Ahmed is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

When attempting to crack an unknown Windows XP LM hash, which method is most efficient? Complete brute force Rainbow tables Dictionary attack with a large wordlist Passing the hash Birthday attack Answer: B Category: password cracking, hashes

A machine that you have accessed stores password hashes without salts A machine that you have accessed stores password hashes without salts. How would you best crack the hashes? Complete brute force Rainbow tables Dictionary attack with a large wordlist Passing the hash Password guessing Answer: B Category: password cracking, hashes

You obtain a leaked database of SHA-1 hashes of LinkedIn passwords You obtain a leaked database of SHA-1 hashes of LinkedIn passwords. They are unsalted. How would you quickly crack as many passwords as possible? Complete brute force Rainbow tables Dictionary attack with a large wordlist Passing the hash Password guessing Answer: B Category: password cracking, hashes

You obtain a dump of password hashes that are salted You obtain a dump of password hashes that are salted. What is the best approach to obtain as many passwords as possible? Complete brute force Rainbow tables Dictionary attack with a large wordlist Passing the hash Birthday attack Answer: C Category: password cracking, hashes

A remote machine within scope is up and accepting NTLM logins A remote machine within scope is up and accepting NTLM logins. What is necessary to connect to this machine? An NTLM hash A username and an LM password A username and an NTLM password A username and an NTLM hash A username and an LM hash Answer: D Category: pass-the-hash

A remote machine within scope is up and accepting LM logins A remote machine within scope is up and accepting LM logins. What is necessary to connect to this machine? An LM hash A username and an LM password A username and an NTLM password A username and an NTLM hash A username and an LM hash Answer: E Category: pass-the-hash

You’ve gained full access to a Windows XP SP2 machine You’ve gained full access to a Windows XP SP2 machine. How do you obtain its password hashes? They are available in the passwd file They are available in the SAM registry hive They are available in the shadow file They are available in the Ntuser.dat registry hive Answer: B Category: password cracking

You’ve gained full access to a modern Ubuntu machine You’ve gained full access to a modern Ubuntu machine. How do you obtain its password hashes? They are available in the passwd file They are available in the SAM registry hive They are available in the shadow file They are available in the Ntuser.dat registry hive Answer: C Category: password cracking

Given an online service that takes unlimited login attempts, which tool would be best to use to crack a password without hashes? John Ophcrack Hydra Hashcat A or C Answer: C Category: password cracking

Given a set of LM hashes and a rainbow table, which of these tools would be most efficient to crack some of these hashes? John Ophcrack Hashcat Hydra A or C Answer: B Category: password cracking

Which of these tools would be best used on a set of modern Ubuntu password hashes? John Ophcrack Hashcat Hydra A or C Answer: E Category: password cracking