How Safe are They?
Overview Passwords Cracking Attack Avenues On-line Off-line Counter Measures
Non-Technical Passwords
Brute Force Approach Steps … Until Found or Start Over
Passwords Protect Information Seen as Secure Cracking Algorithms All or Nothing Off by One Same as Not Close 8 Characters Lower Case Billion Combinations 8 Characters Upper and Lower 221 Trillion 8 Characters Upper, Lower, and Special 669 Quadrillion
Cracking Ways to get passwords Weak Encryption (Lan Man) Guess Default password Blank password Letters in row on keyboard User name Name important to user Social Engineering
Cracking Password length Possible All charactersOnly lowercase characters 3 characters second0.02 second 4 characters1, minutes0.046 second 5 characters52, hours11.9 seconds 6 characters1,827, days5.15 minutes 7 characters59,406, years2.23 hours 8 characters1,853,494, centuries2.42 days 9 characters56,222,671,23220 millenniums2.07 months * Using Brute Force for Every Combination of Characters
Cracking * Wired December 2012
On-Line Types of Attacks Dictionary – uses dictionary file Brute Force – All combinations Hybrid – Spin off of common passwords (password1 or 1password) Single Term – Brute Force
On-Line Password-Based Key Derivation Function Version 2 – PBKDF2 Heuristic Rules Produces Candidate Passwords Flushes Out Poorer Choices Faster than Randomly Chosen Ones
On-Line Tools Script Based – Custom, Metasploit, Sniffer Browser Based (Web Login) FireFox’s FireForce Extension Hydra / XHydra
Off-Line Requires Access to Password Data Gained Access SQL Injection Local File System Access Long Periods for Success Many Tools and Techniques
Off-Line Rainbow Tables (Time Memory Trade Off) Applies Hashing Algorithms Uses Dictionary Accumulated in Brute Force Techniques Method Results Saved in Table or Matrix Compare only Hashed Values Can Save Time, Uses a Lot of Memory Needs Lots of Storage Space for Tables / Matrices
Off-Line Tools John the Ripper Cain and Able Ophcrack (Windows) Windows Password FGDump – Retrieves Passwords from SAM Free On-Line OphCrack
Off-Line Two parts to Windows Passwords Called LM1 and LM2 Separated by ‘:’ LM1 Contains Password LM2 Contains Case Information
Off-Line Windows Password Tests 49F83571A279997F1172D0580DAC68AA:2B BD5 2173FA8E3370B9DDB29 512DataDrop4u 83BAC0B36F EDC073793ADCD02:CA49CC1CFF4 7EAD7E4809AD01FF47F56 Croi$$ants!
Counter Measures Longer the Better Obfuscated Passphrase Best I Like To Eat Two Tacos! – Il2e#2T Avoid Hyphens Between Words Avoid Punctuation at End of Password or Passphrase Replace Vowels with Number – Maybe Lock Down System Access Multi-Factor Authentication
References attack-how-important-is-password-complexity/ attack-how-important-is-password-complexity/ Hydra password list ftp://ftp.openwall.com/pub/wordlists/ / / with.html with.html bruteforce-security-hacks-possible (MindStorms Robot Book Capture) bruteforce-security-hacks-possible (On-Line Ophcrack) (FGDump)