Download presentation
Presentation is loading. Please wait.
Published byMark Small Modified over 9 years ago
1
FORESEC Academy FORESEC Academy Security Essentials (II)
2
FORESEC Academy Agenda Access Control - Techniques - Models Passwords - Password Cracking - Password Management
3
FORESEC Academy Key Terms & Principles Data Owner Data Custodian Separation of duties Least Privilege
4
FORESEC Academy Access Control Techniques Discretionary (DAC) Mandatory (MAC) Role-based Rule-based List-based Token-based
5
FORESEC Academy Lattice Techniques Access Matrix - Objects - Subjects Bell-LaPadula Biba Clark-Wilson
6
FORESEC Academy Lattice Techniques (2) Bell-LaPadula Designed for Military Environment Address only Confidentiality Rules - Simple Security Property - Star Property (* Property) - Strong Star Property
7
FORESEC Academy Lattice Techniques (3) Biba Model for Integrity Suited for Commercial Environment Rules - Simple Integrity Property - Integrity Start Property Information only flow downwards
8
FORESEC Academy Lattice Techniques (4) Clark-Wilson Integrity Model Use an access triple - Subject, Program, Object Prevent loss or corruption of data Ensure well formed transactions
9
FORESEC Academy Access Management Account administration Maintenance Monitoring Revocation
10
FORESEC Academy Access Control Models State machine Information flow Covert channels Non-interference
11
FORESEC Academy Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP)
12
FORESEC Academy Centralized Control TACACS RADIUS Domains & Trusts Active Directory Kerberos
13
FORESEC Academy Access Control: Biometrics Hand: Fingerprint, hand geometry Eye: retina, iris Face: Thermograms, Photo Voice print Mannerisms: keystroke, tread, handwriting
14
FORESEC Academy Access Control: Biometrics (2) Key factors in selecting biometrics: Reliability - FRR, FAR, CER, EER User friendliness Cost
15
FORESEC Academy Single Sign-On (SSO) User only have to log on once Credentials are carried with user Simplifies User management Allow centralized management User only has to remember one set of credentials
16
FORESEC Academy Single Sign-On (2) Can take different forms: - Scripts - Directory Services - Kerberos - Thin Clients Security Issues Interoperability Issues
17
FORESEC Academy Access Control: Passwords
18
FORESEC Academy What is Password Cracking? Discovering a plan text password given an encrypted password.
19
FORESEC Academy Methods of Password Cracking Dictionary attack Hybrid attack Brute force attack
20
FORESEC Academy Unix Password Cracking - Crack Name: Crack Operating System: Unix Brief Description: Crack is a "password guessing" program that is designed to quickly identify accounts having weak passwords given a Unix password file.
21
FORESEC Academy Crack Available from ftp://ftp.cerias.purdue.edu/pub/tools/unix/pwdutils/crack Features - Configurable password cracking - Modular approach with various scripts - Combining and extracting password files - Works with any crypt() implementation
22
FORESEC Academy Configuring Crack Download Crack file Unzip the file using gzip - gunzip -r crack5.0.tar.gz Untar the file - tar -xvf crack5.0.tar Read manual.txt Edit the script file Compile program - Crack -makeonly - Crack -makedict
23
FORESEC Academy Running Crack Run Crack with a password file - Crack [options] [-fmt format] [file...] - Crack myfile Pipe output to a file - Crack myfile > output Run Reporter script to see results -./Reporter [-quiet] [-html]
24
FORESEC Academy Effectiveness of Crack User Eric password eric – CRACKED User John password john1234 User Mike password 5369421 User Mary password #57adm7# User Sue password sue – CRACKED User Lucy password 12345 – CRACKED User Pat no password – CRACKED User Tim password password – CRACKED User Cathy password 55555 – CRACKED User Frank password abcde – CRACKED User Tom password mnopqr User Karen password bbbbbbbb - CRACKED
25
FORESEC Academy How to Protect Against it Enforce a strong password policy Use shadow passwords Use one-time passwords Use passwd to enforce strong passwords
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.