Module 4 Password Cracking

Slides:



Advertisements
Similar presentations
Password Cracking With Rainbow Tables
Advertisements

Peak Support Services Ltd Connecting & protecting your business...
Password Cracking Lesson 10. Why crack passwords?
1 J. Alex Halderman A Convenient Method for Securely Managing Passwords J. Alex Halderman Princeton Brent Waters Stanford Edward W. Felten Princeton.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Secure Password Storage JOSHUA SMALL LHNSKEYHTTPS://GITHUB.COM/TECHNION/ LHNSKEY - ROOT PASSWORD GENERATOR FOR CVE
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
Password CrackingSECURITY INNOVATION © Sidebar – Password Cracking We have discussed authentication mechanisms including authenticators. We also.
Testing of Password Policy Anton Dedov ZeroNights 2013.
Password cracking.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Cryptography and Network Security Chapter 20 Intruders
1 MD5 Cracking One way hash. Used in online passwords and file verification.
1 Ola Flygt Växjö University, Sweden Intruders.
Anti-Hacker Tool Kit Password Cracking Brute-Force Tools Chapter 9
Sanjay Goel, School of Business/NYS Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Chapter 3 Passwords Principals Authenticate to systems.
1 MySQL Passwords Password Strength and “Cracking” Presented by Devin Egan Defcon 12 - July 31, 2004 Password Strength and “Cracking” Presented by Devin.
What are Rainbow Tables? Passwords stored in computers are changed from their plain text form to an encrypted value. These values are called hashes, and.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Linux Security.
CSE 461 INTEGRITY CHECKING AND HASHING. JOKE: TELNET.
Nothing is Safe 1. Overview  Why Passwords?  Current Events  Password Security & Cracking  Tools  Demonstrations Linux GPU Windows  Conclusions.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
What Password Cracking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer.
IS 302: Information Security and Trust Week 7: User Authentication (part I) 2012.
Chapter 4 System Hacking: Password Cracking, Escalating Privileges, & Hiding Files.
Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.
Time-Memory tradeoffs in password cracking 1. Basic Attacks Dictionary attack: –What if password is chosen well? Brute Force (online version): –Try all.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
CIS 450 – Network Security Chapter 8 – Password Security.
Mark Shtern. Passwords are the most common authentication method They are inherently insecure.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Cracking Systems Computer Science Innovations, LLC.
Exercises Information Security Course Eric Laermans – Tom Dhaene.
6fb52297e004844aa81be d50cc3545bc Hashing!. Hashing  Group Activity 1:  Take the message you were given, and create your own version of hashing.  You.
Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.
How Safe are They?. Overview Passwords Cracking Attack Avenues On-line Off-line Counter Measures.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
Secmon Basic Oracle Security Monitoring. motivation & start internet security evaluate password cracker to check security of passwords.
What do you know about password? By Guang Ling Oct. 8 th,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Protecting Administrative Credentials Mingchao.
CNIT 124: Advanced Ethical Hacking Ch 9: Password Attacks.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Password cracking Patrick Sparrow, Matt Prestifillipo, Bill Kazmierski.
Password. On a Unix system without Shadow Suite, user information including passwords is stored in the /etc/passwd file. Each line in /etc/passwd is a.
Distributed Computing Projects. Find cures for diseases like Alzheimer's and Parkinson's by analyzing the ways proteins develop (protein.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
MIGHTY CRACKER Chris Bugg Chris Hamm Jon Wright Nick Baum We could consider using the Mighty Cracker Logo located in the Network Folder.
Password Cracking COEN 252 Computer Forensics. Social Engineering Perps trick Law enforcement, private investigators can ask. Look for clues: Passwords.
Penetration Testing Exploiting I: Password Cracking
CIT 480: Securing Computer Systems
COEN 252 Computer Forensics
Passwords Everywhere Ing. Ondřej Ševeček | GOPAS a.s. |
CS 465 PasswordS Last Updated: Nov 7, 2017.
How do I find my PDF password with simple operations.
Crypto 101 & Password Cracking
זכויות האדם והאזרח אבנר כהן זמיר.
Kiran Subramanyam Password Cracking 1.
Cyber Operation and Penetration Testing Online Password Cracking Cliff Zou University of Central Florida.
ورود اطلاعات بصورت غيربرخط
Elections Choose wisely, this is your chance to prove if election by popular vote works or not.
Exercise: Hashing, Password security, And File Integrity
Elijah Hursey & Austin Keener Academy of Science Summer Bridge 2013
Network Penetration Testing & Defense
Presentation transcript:

Module 4 Password Cracking Presented by Heorot.net Module 4 Password Cracking

Objectives Understand abilities and limitations of password cracking Identify different password encryption methods Identify and use password cracking tools

Abilities and Limitations Your ability to crack the password is only as good as your password list Complex passwords require more time to crack Remote cracking is slow and very noisy

Identify Encryption Methods Passwords are one-way encryptions *nix uses DES (wait!!! DES is NOT a hash!!!) /etc/shadow Windows uses MD5 %systemroot%system32%config Example (pw=“password”): Linux: $1$3I90ScF1$rSx/Pn/jQq12DMvMoUwbB0 Windows: 5f4dcc3b5aa765d61d8327deb882cf99

Identify Encryption Methods Passwords are used within applications as well Salt (pw = “password”) Linux: (both are the same) $1$3I90ScF1$rSx/Pn/jQq12DMvMoUwbB0 $1$7TKzgLz8$2NXCd7bIwF6lAV/wvejm.

Identify Encryption Methods Different Encryptions: WEP: 70617373776f7264 MD5: 5f4dcc3b5aa765d61d8327deb882cf99 SHA1: 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 SHA256: b109f3bbbc244eb82441917ed06d618b9008dd09b3befd1b5e07394c706a8bb980b1d7785e5976ec049b46df5f1326af5a2ea6d103fd07c95385ffab0cacbc86 ROT13: cnffjbeq So many other implementations

Password Tools How to crack passwords Brute Force Lookup

Password Tools How to crack passwords Brute Force Lookup Online: Hydra Offline: JTR Lookup Rainbow Tables Google Default passwords Hash Values

Password Tools Dictionaries Be ready to give up Ability to crack passwords is only as good as your dictionary Try to concentrate on commonly used words Sports teams (especially winning ones) Industry terminology Be ready to give up Complex passwords are difficult Remember, this isn’t the movies Best luck is with default passwords

Conclusion Understand abilities and limitations of password cracking Identify different password encryption methods Identify and use password cracking tools