Security Lab

Download Report

Transcript Security Lab

Mark Shtern


Passwords are the most common
authentication method
They are inherently insecure
•
Human generated passwords
• Come from a small domain
• Easy to guess – dictionary attacks
•
Stronger passwords
• Computer generated or verified
• Not user friendly
• Hard to remember



Physical Access
Offline password cracking
Online password cracking



Boot using Linux bootable CD
Mount system drive
Reset Administration Password (Windows:
chntpwd; Linux modify shadow file)


Collect password hashes
Crack passwords


Eavesdropping (Sniffing)
Password file





Windows – SAM,NTDS.dit file (pwdump[2-6] and
fgdump)
Linux – shadow file (unshadow)
Memory Dump (debug tools: WinDgb, gdb), System
calls (APImonitor, strace)
SQL database, configuration file
Source code

Types





Brute Force
Dictionary
Hybrid
Rainbow
The most popular crackers


Windows: Ophcrack, Cain & Abel, LCP
Linux: John the Ripper (john)



Eavesdropping: Encrypt the channel, e.g.
using SSL or SSH
Offline dictionary attacks: Limit access to
password hashes, strong passwords, password
lifetime, use salt
Online dictionary attacks: Delayed answers,
strong passwords, account lockouts