SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
The Death of Passwords
Dangers to Passwords
● Passwords are “phished”
● Passwords are shared
● Users use dictionary words or “lazy” passwords
● Users reuse password for different sites
● Users recycle passwords or add numbers at the end (BlueDevil#9)
● Passwords can be cracked using:
    Brute Force the hashes
    AND / OR Rainbow Tables
    AND / OR GPU Cracking ...
Demo of the GPU cracking

5 characters of mixed cases, characters and
numbers: ~2.5 min brute force of NVidia NVS
        3100M (16 cores, 512 Mb)
              for comparison,
            NVidia card PCI Express - eVGA
 Memory clock 4212 MHz Effective. Shader clock 1800 MHz.
       Cuda cores 512. Memory 3072MB GDDR5.
                         ~$600
Cracking Passwords
                                                           d131dd02c5e
                                d131dd02c5e                6eec4693d9a
        Password Guess




                         HASH
                                6eec4693d9a                 0698aff95c
                                 0698aff95c




                                                 Password File


Password Type            Using the CPU        Using the GPU
6 char (no spec chars) 1 hour 30 sec          4 seconds
7 char (no spec chars) 4 days                 17 minutes 30
                                              seconds
7 char (spec chars)      75 days              7 hours
9 char (spec chars)      43 years             48 days
12345 anyone?

“I'm so clever” passwords:
 Q1W2E3R4
A!S@D#F$
zxcv/.,m
Aq1Sw2De3Fr4
L33tSp3@K (th3y w1ll n3v3r gu3$$)
Dictionary lists, hybrid attacks
          and mangle rules
#define RULE_OP_MANGLE_LREST            'l' //   lower case all chars
#define RULE_OP_MANGLE_UREST            'u' //   upper case all chars
#define RULE_OP_MANGLE_LREST_UFIRST     'c' //   lower case all chars, upper case 1st
#define RULE_OP_MANGLE_UREST_LFIRST     'C' //   upper case all chars, lower case 1st
#define RULE_OP_MANGLE_TREST            't' //   switch the case of each char
#define RULE_OP_MANGLE_TOGGLE_AT        'T' //   switch the case of each char on pos N
#define RULE_OP_MANGLE_REVERSE          'r' //   reverse word
#define RULE_OP_MANGLE_DUPEWORD         'd' //   append word to itself
#define RULE_OP_MANGLE_DUPEWORD_TIMES   'p' //   append word to itself N times
#define RULE_OP_MANGLE_REFLECT          'f' //   reflect word (append reversed word)
#define RULE_OP_MANGLE_ROTATE_LEFT      '{' //   rotate the word left. ex: hello -> elloh
#define RULE_OP_MANGLE_ROTATE_RIGHT     '}' //   rotate the word right. ex: hello -> ohell
#define RULE_OP_MANGLE_APPEND           '$' //   append char X
#define RULE_OP_MANGLE_PREPEND          '^' //   prepend char X
#define RULE_OP_MANGLE_DELETE_FIRST     '[' //   delete first char of word
#define RULE_OP_MANGLE_DELETE_LAST      ']' //   delete last char of word
#define RULE_OP_MANGLE_DELETE_AT        'D' //   delete char of word at pos N
#define RULE_OP_MANGLE_EXTRACT          'x' //   delete X chars of word at pos N
#define RULE_OP_MANGLE_INSERT           'i' //   insert char X at pos N
#define RULE_OP_MANGLE_OVERSTRIKE       'o' //   overwrite with char X at pos N
#define RULE_OP_MANGLE_TRUNCATE_AT      '''//   cut the word at pos N
#define RULE_OP_MANGLE_REPLACE          's' //   replace all chars X with char Y
#define RULE_OP_MANGLE_PURGECHAR        '@' //   -- not implemented --
#define RULE_OP_MANGLE_DUPECHAR_FIRST   'z' //   prepend first char of word to itself. ex:
hello -> hhello
#define RULE_OP_MANGLE_DUPECHAR_LAST    'Z' // append last char of word to itself.    ex:
hello -> helloo
#define RULE_OP_MANGLE_DUPECHAR_ALL     'q' // duplicate all chars. ex: hello ->
hheelllloo
Rainbow Tables
●   http://www.freerainbowtables.com/ (using
    BOINC distributed computing for
    calculation) (5271 GB as of 02/20/2012)

●   RainbowCrack –your local friendly rainbow
    tables generator / converter (different
    formats of RT) / cracker
RainbowCrack Project example

             ntlm_mixalpha-numeric#1-9
Hash Algorithm: NTLM
Charset:
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789
Plaintext Length: 1 to 9
Key Space: 13,759,005,997,841,642 (about 253.6)
Table Pre-computation Effort: 59,476,604,035,792,896 (about
255.7) hash computations
Table Size: 864 GB

That pretty much means the game is over for NTLM
passwords under 10 digits alphanumeric!
Methods to Compromise
                           Defense

              Accounts/Passwords
                      Longer
                                            Accou   Mu            Netw    Host-
  Password Attack     passwor    Regular
                                            nt      lti-
                                                           Edu
                                                                  ork     based
                      ds         Password                  cati
                                            locko   fac           encry   securi
                      (passphr   changes                   on
                                            uts     tor           ption   ty
                      ases)



Password Cracking
• Dictionary Attack
• Brute Force            ✔          ✔        ✔      ✔
• Rainbow Tables
• GPU Cracking
Password Sharing                                    ✔       ✔
Phishing/Social
                                                    ✔       ✔
Engineering
Man-in-the-Middle
                                                    ✔       ✔      ✔
Attack
Network Sniffing         ✔          ✔        ✔      ✔              ✔
Keylogger                                           ✔
                                                                     ✔
                                                    * *(unless digital cert)
What is Multi-Factor
• Authentication involves:
  – Something you know (e.g. password)
  – Something you have (e.g. digital cert, “token”)
  – Something you are (e.g. fingerprint, voice pattern)
  – Somewhere you are (e.g. GPS or network IP)


• Passwords provide 1 of these items. What if we supported
  the use of a second? Or a third?
• Depending on a user role AND the application they are trying
  to access we could provide a second factor for authentication
Option
           Multifactor Options:
              Pros      Cons
Tokens          Industry standard;       Token replacement costs;
                can implement into       if lost, stolen, or not
                current                  available, cannot log-in;
                authentication           may not be able to log-in
                services; can run on     from a guest machine;
                top of existing          ‘seed’ server must be
                password policy          protected at all costs
Digital         Cheapest option (via     Only ½ of a factor in some
Certificates    Incommon); Least         cases; Cert must be
                impact to users; can     installed on all user
                run on top of existing   devices; cannot log-in
                password policy          from a guest machine;
                                         depend on user key
                                         protection
Phone (SMS/QR   Similar to tokens;       User has to have a phone
tech)           low-cost/open source     that can take pictures or
                options; works well      SMS; If phone is lost,
                for those that have      stolen, or not available,
                smart phones; can        cannot log-in
Passwords Alone Are No
   Longer Effective

Más contenido relacionado

Similar a 2012 03 The Death of Passwords

Password (in)security
Password (in)securityPassword (in)security
Password (in)securityEnrico Zimuel
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute forcevishalgohel12195
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2Iftach Ian Amit
 
Strong cryptography in PHP
Strong cryptography in PHPStrong cryptography in PHP
Strong cryptography in PHPEnrico Zimuel
 
Cryptography - Overview
Cryptography - OverviewCryptography - Overview
Cryptography - OverviewMohammed Adam
 
Improving password-based authentication
Improving password-based authenticationImproving password-based authentication
Improving password-based authenticationFrank Denis
 
Game Development Challenges
Game Development ChallengesGame Development Challenges
Game Development ChallengesNick Pruehs
 
BCS_PKI_part1.ppt
BCS_PKI_part1.pptBCS_PKI_part1.ppt
BCS_PKI_part1.pptUskuMusku1
 
Wordlist Generation and Wifi Cracking
Wordlist Generation and Wifi CrackingWordlist Generation and Wifi Cracking
Wordlist Generation and Wifi CrackingShakar Bhattarai
 
How to hide your browser 0-days
How to hide your browser 0-daysHow to hide your browser 0-days
How to hide your browser 0-daysZoltan Balazs
 
Django Web Application Security
Django Web Application SecurityDjango Web Application Security
Django Web Application Securitylevigross
 
Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)Patricia Aas
 
Stop expecting magic fairy dust: Make apps secure by design
Stop expecting magic fairy dust: Make apps secure by designStop expecting magic fairy dust: Make apps secure by design
Stop expecting magic fairy dust: Make apps secure by designPatrick Walsh
 
Using Cryptography Properly in Applications
Using Cryptography Properly in ApplicationsUsing Cryptography Properly in Applications
Using Cryptography Properly in ApplicationsGreat Wide Open
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
Cryptographic authentication
Cryptographic authenticationCryptographic authentication
Cryptographic authenticationnirmal08
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Umesh Kumar
 

Similar a 2012 03 The Death of Passwords (20)

Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Smart card
Smart cardSmart card
Smart card
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2
 
Strong cryptography in PHP
Strong cryptography in PHPStrong cryptography in PHP
Strong cryptography in PHP
 
Cryptography - Overview
Cryptography - OverviewCryptography - Overview
Cryptography - Overview
 
Improving password-based authentication
Improving password-based authenticationImproving password-based authentication
Improving password-based authentication
 
Game Development Challenges
Game Development ChallengesGame Development Challenges
Game Development Challenges
 
BCS_PKI_part1.ppt
BCS_PKI_part1.pptBCS_PKI_part1.ppt
BCS_PKI_part1.ppt
 
Wordlist Generation and Wifi Cracking
Wordlist Generation and Wifi CrackingWordlist Generation and Wifi Cracking
Wordlist Generation and Wifi Cracking
 
How to hide your browser 0-days
How to hide your browser 0-daysHow to hide your browser 0-days
How to hide your browser 0-days
 
Information Security
Information SecurityInformation Security
Information Security
 
Django Web Application Security
Django Web Application SecurityDjango Web Application Security
Django Web Application Security
 
Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)
 
Stop expecting magic fairy dust: Make apps secure by design
Stop expecting magic fairy dust: Make apps secure by designStop expecting magic fairy dust: Make apps secure by design
Stop expecting magic fairy dust: Make apps secure by design
 
Using Cryptography Properly in Applications
Using Cryptography Properly in ApplicationsUsing Cryptography Properly in Applications
Using Cryptography Properly in Applications
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
Cryptographic authentication
Cryptographic authenticationCryptographic authentication
Cryptographic authentication
 
Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02Pptforpicturepasswordauthentication 130125073736-phpapp02
Pptforpicturepasswordauthentication 130125073736-phpapp02
 

Más de Raleigh ISSA

Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9Raleigh ISSA
 
Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8Raleigh ISSA
 
Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7Raleigh ISSA
 
Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6Raleigh ISSA
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account securityRaleigh ISSA
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014Raleigh ISSA
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...Raleigh ISSA
 
April 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slidesApril 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slidesRaleigh ISSA
 
March 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info secMarch 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info secRaleigh ISSA
 
March 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slidesMarch 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slidesRaleigh ISSA
 
February 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slidesFebruary 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slidesRaleigh ISSA
 
2014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 20142014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 2014Raleigh ISSA
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
2013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 20132013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 2013Raleigh ISSA
 
2013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 20132013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 2013Raleigh ISSA
 
2013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 20132013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 2013Raleigh ISSA
 
2013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 20132013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 2013Raleigh ISSA
 
2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith Pigues2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith PiguesRaleigh ISSA
 
2013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 20132013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 2013Raleigh ISSA
 
2013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 20132013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 2013Raleigh ISSA
 

Más de Raleigh ISSA (20)

Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9
 
Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8
 
Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7
 
Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...
 
April 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slidesApril 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slides
 
March 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info secMarch 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info sec
 
March 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slidesMarch 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slides
 
February 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slidesFebruary 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slides
 
2014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 20142014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 2014
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
2013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 20132013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 2013
 
2013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 20132013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 2013
 
2013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 20132013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 2013
 
2013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 20132013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 2013
 
2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith Pigues2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith Pigues
 
2013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 20132013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 2013
 
2013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 20132013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 2013
 

2012 03 The Death of Passwords

  • 1. The Death of Passwords
  • 2. Dangers to Passwords ● Passwords are “phished” ● Passwords are shared ● Users use dictionary words or “lazy” passwords ● Users reuse password for different sites ● Users recycle passwords or add numbers at the end (BlueDevil#9) ● Passwords can be cracked using: Brute Force the hashes AND / OR Rainbow Tables AND / OR GPU Cracking ...
  • 3. Demo of the GPU cracking 5 characters of mixed cases, characters and numbers: ~2.5 min brute force of NVidia NVS 3100M (16 cores, 512 Mb) for comparison, NVidia card PCI Express - eVGA Memory clock 4212 MHz Effective. Shader clock 1800 MHz. Cuda cores 512. Memory 3072MB GDDR5. ~$600
  • 4. Cracking Passwords d131dd02c5e d131dd02c5e 6eec4693d9a Password Guess HASH 6eec4693d9a 0698aff95c 0698aff95c Password File Password Type Using the CPU Using the GPU 6 char (no spec chars) 1 hour 30 sec 4 seconds 7 char (no spec chars) 4 days 17 minutes 30 seconds 7 char (spec chars) 75 days 7 hours 9 char (spec chars) 43 years 48 days
  • 5. 12345 anyone? “I'm so clever” passwords: Q1W2E3R4 A!S@D#F$ zxcv/.,m Aq1Sw2De3Fr4 L33tSp3@K (th3y w1ll n3v3r gu3$$)
  • 6. Dictionary lists, hybrid attacks and mangle rules #define RULE_OP_MANGLE_LREST 'l' // lower case all chars #define RULE_OP_MANGLE_UREST 'u' // upper case all chars #define RULE_OP_MANGLE_LREST_UFIRST 'c' // lower case all chars, upper case 1st #define RULE_OP_MANGLE_UREST_LFIRST 'C' // upper case all chars, lower case 1st #define RULE_OP_MANGLE_TREST 't' // switch the case of each char #define RULE_OP_MANGLE_TOGGLE_AT 'T' // switch the case of each char on pos N #define RULE_OP_MANGLE_REVERSE 'r' // reverse word #define RULE_OP_MANGLE_DUPEWORD 'd' // append word to itself #define RULE_OP_MANGLE_DUPEWORD_TIMES 'p' // append word to itself N times #define RULE_OP_MANGLE_REFLECT 'f' // reflect word (append reversed word) #define RULE_OP_MANGLE_ROTATE_LEFT '{' // rotate the word left. ex: hello -> elloh #define RULE_OP_MANGLE_ROTATE_RIGHT '}' // rotate the word right. ex: hello -> ohell #define RULE_OP_MANGLE_APPEND '$' // append char X #define RULE_OP_MANGLE_PREPEND '^' // prepend char X #define RULE_OP_MANGLE_DELETE_FIRST '[' // delete first char of word #define RULE_OP_MANGLE_DELETE_LAST ']' // delete last char of word #define RULE_OP_MANGLE_DELETE_AT 'D' // delete char of word at pos N #define RULE_OP_MANGLE_EXTRACT 'x' // delete X chars of word at pos N #define RULE_OP_MANGLE_INSERT 'i' // insert char X at pos N #define RULE_OP_MANGLE_OVERSTRIKE 'o' // overwrite with char X at pos N #define RULE_OP_MANGLE_TRUNCATE_AT '''// cut the word at pos N #define RULE_OP_MANGLE_REPLACE 's' // replace all chars X with char Y #define RULE_OP_MANGLE_PURGECHAR '@' // -- not implemented -- #define RULE_OP_MANGLE_DUPECHAR_FIRST 'z' // prepend first char of word to itself. ex: hello -> hhello #define RULE_OP_MANGLE_DUPECHAR_LAST 'Z' // append last char of word to itself. ex: hello -> helloo #define RULE_OP_MANGLE_DUPECHAR_ALL 'q' // duplicate all chars. ex: hello -> hheelllloo
  • 7. Rainbow Tables ● http://www.freerainbowtables.com/ (using BOINC distributed computing for calculation) (5271 GB as of 02/20/2012) ● RainbowCrack –your local friendly rainbow tables generator / converter (different formats of RT) / cracker
  • 8. RainbowCrack Project example ntlm_mixalpha-numeric#1-9 Hash Algorithm: NTLM Charset: abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 Plaintext Length: 1 to 9 Key Space: 13,759,005,997,841,642 (about 253.6) Table Pre-computation Effort: 59,476,604,035,792,896 (about 255.7) hash computations Table Size: 864 GB That pretty much means the game is over for NTLM passwords under 10 digits alphanumeric!
  • 9. Methods to Compromise Defense Accounts/Passwords Longer Accou Mu Netw Host- Password Attack passwor Regular nt lti- Edu ork based ds Password cati locko fac encry securi (passphr changes on uts tor ption ty ases) Password Cracking • Dictionary Attack • Brute Force ✔ ✔ ✔ ✔ • Rainbow Tables • GPU Cracking Password Sharing ✔ ✔ Phishing/Social ✔ ✔ Engineering Man-in-the-Middle ✔ ✔ ✔ Attack Network Sniffing ✔ ✔ ✔ ✔ ✔ Keylogger ✔ ✔ * *(unless digital cert)
  • 10. What is Multi-Factor • Authentication involves: – Something you know (e.g. password) – Something you have (e.g. digital cert, “token”) – Something you are (e.g. fingerprint, voice pattern) – Somewhere you are (e.g. GPS or network IP) • Passwords provide 1 of these items. What if we supported the use of a second? Or a third? • Depending on a user role AND the application they are trying to access we could provide a second factor for authentication
  • 11. Option Multifactor Options: Pros Cons Tokens Industry standard; Token replacement costs; can implement into if lost, stolen, or not current available, cannot log-in; authentication may not be able to log-in services; can run on from a guest machine; top of existing ‘seed’ server must be password policy protected at all costs Digital Cheapest option (via Only ½ of a factor in some Certificates Incommon); Least cases; Cert must be impact to users; can installed on all user run on top of existing devices; cannot log-in password policy from a guest machine; depend on user key protection Phone (SMS/QR Similar to tokens; User has to have a phone tech) low-cost/open source that can take pictures or options; works well SMS; If phone is lost, for those that have stolen, or not available, smart phones; can cannot log-in
  • 12. Passwords Alone Are No Longer Effective