Download presentation
Presentation is loading. Please wait.
Published byLouisa Hood Modified over 9 years ago
1
Mark Shtern
2
Passwords are the most common authentication method They are inherently insecure
3
Human generated passwords Come from a small domain Easy to guess – dictionary attacks Stronger passwords Computer generated or verified Not user friendly Hard to remember
4
Physical Access Offline password cracking Online password cracking
5
Boot using Linux bootable CD Mount system drive Reset Administration Password (Windows: chntpwd; Linux modify shadow file)
6
Collect password hashes Crack passwords
7
Eavesdropping (Sniffing) Password file Windows – SAM,NTDS.dit file (pwdump[ 2-6 ] and fgdump) Linux – shadow file (unshadow) Memory Dump (debug tools: WinDgb, gdb), System calls (APImonitor, strace) SQL database, configuration file Source code
8
Types Brute Force Dictionary Hybrid Rainbow The most popular crackers Windows: Ophcrack, Cain & Abel, LCP Linux: John the Ripper (john)
9
Eavesdropping: Encrypt the channel, e.g. using SSL or SSH Offline dictionary attacks: Limit access to password hashes, strong passwords, password lifetime, use salt Online dictionary attacks: Delayed answers, strong passwords, account lockouts
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.