Your Password Complexity Requirements are Worthless. Rick Redman KoreLogic

Size: px
Start display at page:

Download "Your Password Complexity Requirements are Worthless. Rick Redman KoreLogic www.korelogic.com"

Transcription

1 Your Password Complexity Requirements are Worthless Rick Redman KoreLogic

2 Introduction Rick Redman < > 88FB D23C 5AC A933 6E99 4E2C EF75 Penetration Tester since 1999 Web Application security tester since ~2001 I Created and run the DEFCON contest Crack Me If You Can I run KoreLogic's Password Recovery Service (PRS). Used for incident response/forensics/password audits and recovery. I do this for a living. Published numerous wordlists/rules/tips/videos on password cracking Spoken at OWASP National, OWASP Austin, ISSA Meetings, DerbyCon, ISSW, DEFCON, ShmooCon, Bsides, PasswordsCon, TechnoForensics, etc

3 Introduction We are talking about password cracking/recovery. This is what takes place after a site is compromised. But we are also going to talk about protecting our end-users Both from application mistakes And from them-selves Example: LinkedIn Password hashes were posted anonymously. Within an hour, it became obvious that the source was LinkedIn. Currently at 97% cracked.

4 Introduction In general Users: Use simple passwords Use predictable passwords Have no clue what makes a password complex Internet Sites: Do not require users to choose complex passwords Do not know what a complex password is Do not store passwords in a secure manner Are a decade behind enterprises on password policy This is important for later

5 Current Password Complexity Defenses: Enterprise Password complexity rules Minimum length (Must be 8 characters) Character classes (Must contain a digit) Enterprise Password rotation History retention (No password re-use allowed) Better hash types (rarely implemented). Blacklisting top 500 passwords (see Twitter) JavaScript password meters These have NOT changed in the last 5-10 years! We need a better defense - One based on REAL data. One designed to annoy password crackers.

6 Current Password Complexity Defenses: OWASP s Recommendation: at_sheet#password_rotation Password Complexity Applications should have a password complexity requirement of: Passwords must be 8 characters or greater Passwords must require 3 of the following 4 character types [upper case letters, lower case letters, numbers, special characters] Your Enterprise likely has the same password requirements. Possibly 4/4 required.

7 Classic Password Cracking Methods (15+ years old): Naive bruteforce (impractical) Wordlists (Names, places, sports, company names) Mangling rules (Such as, capitalize first letter) Markov Chains (mathematical patterns based on position of letters next to other letters) Popular tools: Hashcat / OclHashcat, L0phtCrack, John the Ripper, InsidePro, PassWare, etc.

8 Newer Password Cracking Methods: Password reuse. (LinkedIn example). Rule generation based on previous data. Rule generation based on user-base or source of password leak ( Link Linked Linkedin LinkedIn ) Pattern Based (topologies) This is what we are here to talk about. This is what we _should_ be defending against. I will prove this.

9 Lets build a cracking machine.. A little math, for $2,000 you can build a small password cracking rig of 4 high-end GPU cards. With that one machine, you can crack all 8-character NTLM password hashes (NTLM is Microsoft Windows uses) in 3 days. All 8-character MD5 password hashes in 6.5 days. All 8-character SHA1 password hashes in 20 days. All 8-character SHA256 password hashes in 50 days. All 8-character SCrypt password hashes in billion years (SCrypt is what PCI/OWASP Recommends)

10 Lets build a cracking machine.. For reference: LinkedIn used SHA1 hashes to protect their passwords. LinkedIn password hashes were obtained by hackers 6 months before they were released. KoreLogic uses the equivalent of 10 of the example systems for our password recovery server (PRS).

11 Lets build a cracking machine.. But as you add length, the time gets longer quickly (against MD5): All 8-character MD5 password hashes in 6.5 days. 9 characters: ~500 days 10 characters: ~145 years 11 characters: ~12,000+ years So 9 character passwords are safe!? 500 days is a lot! (all sarcasm intended). So MD5 is safe?! (More on this later).

12 Who doesn t hash their passwords? Some sites do not even hash their password s at all. And end up being shamed publicly.

13 Patterns / Topologies Selective Brute Force: Rather than testing all possible passwords, pick some specific subsets, or patterns, and try all passwords that fit that pattern ( topology ). For instance Austin1! Sports9? Hiphop4$ Camels2% All use the same pattern: Uppercase, 5 lowercase, 1 number, 1 special. We will use the same notation as the Hashcat (JTR as well) tools: 'u' to represent "any uppercase letter" 'l' for "lowercase letter" 'd' for "digit" 's' for "special" (punctuation) The above example is then?u?l?l?l?l?l?d?s, or just ulllllds for short. 8 character password: 4^8, or 65,536 possible topologies

14 Patterns / Topologies The question then is: Do users bias towards certain common password topologies? If you can guess which patterns users have over-used, you can effectively bruteforce *just* those topologies, and crack a disproportionate number of passwords? We analyzed the passwords we had cracked from several different enterprise assessments, looking for frequently used topologies. Think of enterprise passwords as passwords that *have* meet password complexity (usually 8 length, having 3 of 4 categories (upper / lower / special / digit).

15 Patterns / Topologies Sample Organization #1 - Fortune ,356 of 263,888 NTLM logins cracked (including histories) over 99% 7,308 unique topologies found Most popular topologies: 33,458 ullllldd (8 character) 12.7% (Example: Austin15) 33,394 ulllllldd (9 character) 12.7% (Example: Hideout15) 27,898 ullldddd 10.6% 19,190 ullllllldd 7.3% 13,204 ulllldddd 5.0% (cont ) (Example: Rock2015) (Example: Ladybird15) (Example: Austi2015)

16 Patterns / Topologies The top 5 patterns are used by a total of 48% of all users. The top 100 patterns are used by a total of 85% of all users. 99.9% of passwords meet their complexity requirements Look at how similar the top 8-char topologies are to the top 9-char ones! They just added one lowercase letter (used a longer word).

17

18 Patterns / Topologies Sample 2 - Fortune 500 Company 419,287 of 449,192 NTLM logins cracked (including histories) 93% 14,266 unique topologies found Most popular topologies: 19,200 ullllldd (8 character) 17,914 ullllldds 14,025 ulldddds 12,477 ulllllds 9,216 ullsdddd 4.3% (9 character) 4.0% 3.1% 2.8% 2.1% Top 5 topologies crack 16% of all passwords. The top 100 topologies are used by a total of 62% of all users.

19

20 Patterns / Topologies We analyzed the password topologies used in 8 different enterprises of 4,000 or more logins where we had cracked more than 90% of all password hashes. We found that they had many popular topologies in common. This proves that these patterns/topologies are one key to how users create passwords. Therefor, we need to prevent them.

21

22 Patterns / Topologies Things the data told us: This data confirmed things we had long observed anecdotally: Users will pick the lowest-common-denominator that will be allowed by policies. When required to use 3 of 4 character classes, the most popular is: one upper, then several lowers, then 2-4 digits. If required to use 4 of 4 charsets, users just add a special to the end. (And most often that special character is!') If the minimum length increases, users are most likely to just use a longer base word, adding a lowercase letter. User behavior trends apply across organizations.

23 Patterns / Topologies Bottom line: Complexity rules don't help as much as enterprises think they do. If same complexity rules are deployed on web applications, the same patterns will emerge. But: If your web site/application does not require password complexity, your passwords are much much much worse. See: rockyou.txt (google it) See: LinkedIn (next slide) If you use the standard enterprise password requirements on your web application, it does _not_ make your users create stronger passwords. Enterprise complexity recommendations do _not_ make users create stronger passwords.

24 Patterns / Topologies Example: LinkedIn No forced complexity, but user base more likely to know password complexity rules

25 Whats the big deal? So why is this important to developers? and/or application testers? Because, FIX IT! That is why. Web Applications are not enforcing password complexity. This should be a finding/risk in a security report. This should be a requirement for PCI compliance. Java-Script password complexity meters are a risk They can be bypassed They leak information Most are NOT trained on real patterns or based on real data (See new few slides for examples)

26 Current Strength Meters Denver14 is good? Ullllldd Is in the top 100 list of most common patterns. Would crack in <1 minute.

27 Current Strength Meters Bacon14! is Strong? Really? Ulllldds pattern. It in the top 100 list of most common patterns. Would crack in <1 minute.

28 Current Strength Meters Denver14 will not take 15 hours to crack. This pattern takes <1 minute to run. And is in the top 100 most common patterns.

29 Current Strength Meters Bacon14! will not take 3 days to crack. This pattern takes <1 minute to run. And is in the top 100 most common patterns.

30 Current Strength Meters At least one site got it right. > Denver14 on both examples

31 Whats the big deal? (continued..) As auditors/testers are we asking about password storage? hash format? salts? Is this a line-item on our check lists? Will clients/developers even know? Windows SysAdmins: Don't have a choice in what hash format you use. UNIX/Linux SysAdmins: _DO_ Have a choice in which format they use. OWASP has a decent Cheat Sheet about this: eet All web applications accessed by an PCI-aware tester should follow the guidelines in this cheat sheet. Of the 500 or so large password leaks disclosed by attackers in the last year, not a single one followed these guidelines. (See LinkedIn eharmony) Closest: Adobe breached. They used DES, but with a common key.

32 Example of how its done correctly. Public Disclosure.

33 Type Value Type Value md5() 630 ntlm() 7 Password md5(md5(p).s) 134 sha512() 2 hashing in md5(s.p) 120 sha256() 3 crypt md5() 5 More Proof: the wild is md5(md5(s).md5(p 108 )) horrible. sha1() 94 md5(s.p.s) 3 Of all sites mysql5() 53 drupal7() 1 with md5(p.s) 38 md5(s.md5(p)) 1 password crypt des() 36 sha1(md5(p)) 2 mysql323() 34 sha1 base64() 1 sha512(p.s) 28 ssha1() 7 md5(md5(p)) 20 md5_half() 5 phpass() 15 crypt blowfish() 4 sha1(s.p) 14 ntlm() 7 hashes leaked in the last 6 months:

34 Defenses need to evolve Defenses need to evolve. We need to add a new dimension to password strength enforcement. Rules like minimum length, minimum character sets required, no dictionary words, etc are still needed. We need a way to analyze our risk/threat to our enterprises We also need a way to prevent users from gravitating towards the same password patterns (topologies) and overusing them. How long are we going to be complacent about this? How long is the fear of auditing passwords going to out-weigh the risk of not knowing what our users are setting as their passwords?

35 Password Audits (Warning - Shameless Plug) Example Report: During this audit, KoreLogic recovered passwords for 41.83% of the users in the ABCDEF domain [1]. Of these, 34.49% were active, and 7.34% were disabled. Viewed independently, 79.36% of the active and 12.99% of the disabled user passwords were recovered, respectively. Total Accounts Cracked = 4400 Total Accounts = Enabled Accounts Cracked = 3600 Total Enabled Accounts = 4600 Disabled Accounts Cracked = 700 Total Disabled Accounts = 6000 (Notice that the disabled accounts are hard to crack! ~13%)

36 Password Audits (Warning - Shameless Plug) Example Report: When this client started performing password audits, they were unaware of the amount of accounts with old, outdated passwords Over a 5 month period, they have disabled over 5000 accounts that were no longer needed. This cut the password-based attack surface in half! (roughly) The first time an audit was performed 90% of the passwords were cracked. 90% -> 79% improvement = a metric management can understand.

37 Password Audits (Warning - Shameless Plug) Example Report: Password Length Analysis: % (1300) % (1200) % (700) % (500) % (240) % (140) % (110) % (23) % (27) % (6) % (3) % (1) % (1)

38 Password Audits (Warning - Shameless Plug) Example Report: Most common strings of interest (e.g., years, months, seasons, etc.): 149 [CLIENT NAME HERE] Summer Spring June July 6 August 6 Fall 6 Winter 5 May

39 Password Audits (Warning - Shameless Plug) Example Report: Active users with recovered passwords older than one year: 542 (Possible metric to show improvement over time) Single password used the most: 239 unique instances (3 were disabled) Single password used the 2nd most: 19 unique instances (1 was disabled) (Possible metric to show improvement over time) Administrative accounts with recovered passwords: 27 (Possible metric to show improvement over time)

40 Defenses need to evolve Topology Related Defense: What are some ways we could use this knowledge to level the playing field? Blacklist the most common, predictable topologies. Don't allow multiple users to stack up on the same topology force them to spread out. Wear-Level them across the possible topology space. (Advanced topic). Require a minimum topology change between old and new passwords. The primary cost of these is keyspace reduction and userannoyance.

41 Pathwell Tool KoreLogic (with support from DARPA) has developed an open-source PAM replacement for Linux/UNIX systems that implements this. Basic Idea: Block the most common topologies. Example: Block ULLLLLDD ( Such as Denver14) based on its pattern. This will diversify the topologies used by end-users. And will remove the most common topologies from your users passwords. It is currently being ported to be used in a web environment. But the idea can easily be performed using server-side applications - or JavaScript/HTML5. i.e. SSO/LDAP/AD/SiteMinder Plugin

42 Pathwell Tool Advanced Topics/Functionality. When a password changes, the topology used by the new password cannot match the topology of the previous password. When a password changes, the topology used has to be mathematically diverse from the previous password. Hint the user about how to not use black-listed topologies. Do not prevent users from choosing bad passwords, but use PathWell backend to LOG the topologies used. Can be used to learn your users behavior without viewing plain-texts. Do not allow more than (x) users to use the same topology.

43 Pathwell Tool For a list of the 100 most popular password topologies used in Corporate/Enterprise environments check out: 4/04/pathwell_topologies These are the topologies/patterns that should be banned in Enterprise environments.

44 You!= Snow Flake You are not a special unique snow flake. That little trick thats in your head, that you think no one else knows (or can figure out) is used by millions of other people. Even people who use Austin16/ Summer16 / Summer2016/Password1/Texas2016 think this. Tell your users this, prove it to them, embarrass them if you have to, and THEN Train them how to be a unique snow flake. Prevent them from making the simple mistakes.

45 You!= Snow Flake

The State of Modern Password Cracking

The State of Modern Password Cracking SESSION ID: PDAC-W05 The State of Modern Password Cracking Christopher Camejo Director of Threat and Vulnerability Analysis NTT Com Security @0x434a Presentation Overview Password Hashing 101 Getting Hashes

More information

Authenticating Humans

Authenticating Humans 29 Oct 2015 CSCD27 Computer and Network Security Authenticating Humans CSCD27 Computer and Network Security 1 Authenticating Computers and Programs Computers and programs need to authenticate one another:

More information

Password Cracking Beyond Brute-Force

Password Cracking Beyond Brute-Force Password Cracking Beyond Brute-Force by Immanuel Willi Most password mechanisms work by comparing a password against a stored reference value. It is insecure to store the whole password, so one-way functions

More information

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you

More information

User Identity and Authentication

User Identity and Authentication User Identity and Authentication WordPress, 2FA, and Single Sign-On Isaac Potoczny-Jones [email protected] http://tozny.com About the Speaker Galois, Inc. - @galoisinc. Research & Development for computer

More information

This presentation has been modified from its original version. It has been modified to fit your screen.

This presentation has been modified from its original version. It has been modified to fit your screen. This presentation has been modified from its original version. It has been modified to fit your screen. TRIGGER WARNING THIS TALK IS DESIGNED TO OFFEND THE FOLLOWING GROUPS: PEOPLE WHO USE WEAK PASSWORDS

More information

Protecting against modern password cracking

Protecting against modern password cracking Protecting against modern password cracking Are passwords still an adequate form of authentication? by Yiannis Chrysanthou, MSc (RHUL, 2012), and Allan Tomlinson (supervisor), ISG, Royal Holloway istockphoto/ronen

More information

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST. CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape

More information

Hack Your SQL Server Database Before the Hackers Do

Hack Your SQL Server Database Before the Hackers Do Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually

More information

Adobe Systems Software Ireland Ltd

Adobe Systems Software Ireland Ltd Adobe Systems Software Ireland Ltd Own motion investigation report 13/00007 Timothy Pilgrim, Australian Privacy Commissioner Contents Overview... 2 Background... 3 Relevant provisions of the Privacy Act...

More information

The Art of Exploiting Logical Flaws in Web Apps. Sumit sid Siddharth Richard deanx Dean

The Art of Exploiting Logical Flaws in Web Apps. Sumit sid Siddharth Richard deanx Dean The Art of Exploiting Logical Flaws in Web Apps Sumit sid Siddharth Richard deanx Dean A GREAT COLLABORATION! 2 competitors working together! Thanks to: 7Safe, Part of PA Consulting Group Portcullis Computer

More information

What You Can Learn from Bad Guys and Hackers About Cracking Passwords (Sanitized) Rick Redman Senior Security Consultant KoreLogic, INC

What You Can Learn from Bad Guys and Hackers About Cracking Passwords (Sanitized) Rick Redman Senior Security Consultant KoreLogic, INC What You Can Learn from Bad Guys and Hackers About Cracking Passwords (Sanitized) Rick Redman Senior Security Consultant KoreLogic, INC Track Name - Session #Rz Intro: Rick Redman KoreLogic ([email protected])

More information

Attack Frameworks and Tools

Attack Frameworks and Tools Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet

More information

Cracking 400,000 Passwords. Matt Weir Sudhir Aggarwal Florida State University

Cracking 400,000 Passwords. Matt Weir Sudhir Aggarwal Florida State University Cracking 400,000 Passwords Matt Weir Sudhir Aggarwal Florida State University Special Thanks: Dr. Sudhir Aggarwal Professor Breno de Medeiros National Institute of Justice National White Collar Crime Center

More information

Dashlane Security Whitepaper

Dashlane Security Whitepaper Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.

More information

things you haven t done to protect your business from cybercrime

things you haven t done to protect your business from cybercrime 5 things you haven t done to protect your business from cybercrime 5 things you can do to protect your business from cybercrime 27,000,000,000 27billion is a big number and is what the UK government estimates

More information

VoipSwitch Security Audit

VoipSwitch Security Audit VoipSwitch Security Audit Security audit was made at 1 st January 2013 (3.00 PM 10.00 PM UTC +1) by John Doe who is Security Advisor at VoipSwitch Company. Server's IP address : 11.11.11.11 Server has

More information

Attacking NTLM with Precomputed Hashtables

Attacking NTLM with Precomputed Hashtables Attacking NTLM with Precomputed Hashtables warlord [email protected] Contents 1 Introduction 2 2 The design of LM and NTLM 3 2.1 The LanMan disaster......................... 3 2.2 NTLM.................................

More information

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011 Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing

More information

Using Foundstone CookieDigger to Analyze Web Session Management

Using Foundstone CookieDigger to Analyze Web Session Management Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.

More information

Application Security Testing. Generic Test Strategy

Application Security Testing. Generic Test Strategy Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication

More information

NETWORK SECURITY: How do servers store passwords?

NETWORK SECURITY: How do servers store passwords? NETWORK SECURITY: How do servers store passwords? Servers avoid storing the passwords in plaintext on their servers to avoid possible intruders to gain all their users passwords. A hash of each password

More information

Understanding Passwords. Nigel Pentland National Australia Group Room: Nurburgring Session: DB

Understanding Passwords. Nigel Pentland National Australia Group Room: Nurburgring Session: DB Understanding Passwords Nigel Pentland National Australia Group Room: Nurburgring Session: DB Nigel Pentland Senior Security Analyst [email protected] 0141 223 3179 Road Safety analogy Accidents

More information

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Five Steps to Improve Internal Network Security. Chattanooga ISSA Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical

More information

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald About DN-Systems Global Consulting and Technology Services Planning Evaluation Auditing Operates own Security Lab Project Management Integral

More information

Steve Gibson Revolutionizing Website Login and Authentication with SQRL SQRL

Steve Gibson Revolutionizing Website Login and Authentication with SQRL SQRL SQRL A simple & straightforward, open, intellectual property unencumbered, easily explained, provably secure, pseudonymous, 2-party, web domain based, authenticated identity solution for the Internet.

More information

A state-of-the-art password strength analysis demonstrator

A state-of-the-art password strength analysis demonstrator A state-of-the-art password strength analysis demonstrator by Nico van Heijningen (0821976) CMI-Program Technical Informatics Rotterdam University June 26, 2013 First supervisor Second supervisor Dhr.

More information

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and

More information

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4 Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access

More information

Pass-the-Hash. Solution Brief

Pass-the-Hash. Solution Brief Solution Brief What is Pass-the-Hash? The tools and techniques that hackers use to infiltrate an organization are constantly evolving. Credential theft is a consistent concern as compromised credentials

More information

Cracking Salted Hashes

Cracking Salted Hashes Overview: Cracking Salted Hashes Web Application Security: - The Do s and Don ts of Salt Cryptography Data Base security has become more critical as Databases have become more open. And Encryption which

More information

CIS 8630. Business Computer Forensics and Incident Response. Lab Protocol 06: Password Cracking with Cain and Abel

CIS 8630. Business Computer Forensics and Incident Response. Lab Protocol 06: Password Cracking with Cain and Abel CIS 8630 Business Computer Forensics and Incident Response Lab Protocol 06: Password Cracking with Cain and Abel Purpose: Ensure every student gains first-hand experience with password cracking tools.

More information

Beyond files forensic OWADE cloud based forensic

Beyond files forensic OWADE cloud based forensic Beyond files forensic OWADE cloud based forensic Elie Bursztein Stanford University Ivan Fontarensky Cassidian Matthieu Martin Stanford University Jean Michel Picod Cassidian 1 The world is moving to the

More information

Multi-Factor Authentication

Multi-Factor Authentication Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to

More information

Datasäkerhet och integritet

Datasäkerhet och integritet Chapter 7 Host Hardening Important Server Operating Systems Vulnerabilities and Patches Managing Users and Groups Managing Permissions Creating Strong Passwords Testing for Vulnerabilities Threats to Hosts

More information

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. 2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by

More information

Security and Privacy Risks of Using E-mail Address as an Identity

Security and Privacy Risks of Using E-mail Address as an Identity Security and Privacy Risks of Using E-mail Address as an Identity Lei Jin, Hassan Takabi, James B.D. Joshi School of Information Sciences University of Pittsburgh Pittsburgh, PA, US [email protected], {hatakabi,

More information

The Password Problem Will Only Get Worse

The Password Problem Will Only Get Worse The Password Problem Will Only Get Worse New technology for proving who we are Isaac Potoczny-Jones Galois & SEQRD [email protected] @SyntaxPolice Goals & Talk outline Update the group on authentication

More information

Common Criteria Web Application Security Scoring CCWAPSS

Common Criteria Web Application Security Scoring CCWAPSS Criteria Web Application Security Scoring CCWAPSS Author Frédéric Charpentier, security pentester. France. [email protected] Releases Version 1.0 : First public release September 2007 Version

More information

Pentesting for fun... and profit! David M. N. Bryan and Rob Havelt

Pentesting for fun... and profit! David M. N. Bryan and Rob Havelt Pentesting for fun... and profit! David M. N. Bryan and Rob Havelt Agenda Who are David & Rob? Why are we experts? Why do penetration tests? What is a penetration test? What is the goal? Some says it s

More information

Tax and Accounting Document Delivery

Tax and Accounting Document Delivery Tax and Accounting Document Delivery Encrypting PDF Files in Email Attachments: Reduce Risk, Automation and Compliance Administrative Items 90 Minutes (Education, Demo, Q&A) Participants are muted. Please

More information

Web Application Security

Web Application Security Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4

More information

Penetration Testing Walkthrough

Penetration Testing Walkthrough Penetration Testing Walkthrough Table of Contents Penetration Testing Walkthrough... 3 Practical Walkthrough of Phases 2-5... 4 Chose Tool BackTrack (Armitage)... 5 Choose Target... 6 Phase 2 - Basic Scan...

More information

Why The Security You Bought Yesterday, Won t Save You Today

Why The Security You Bought Yesterday, Won t Save You Today 9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About

More information

Kentico CMS security facts

Kentico CMS security facts Kentico CMS security facts ELSE 1 www.kentico.com Preface The document provides the reader an overview of how security is handled by Kentico CMS. It does not give a full list of all possibilities in the

More information

Penetration Testing - a way for improving our cyber security

Penetration Testing - a way for improving our cyber security OWASP EU Tour Bucharest 2013 The OWASP Foundation http://www.owasp.org Penetration Testing - a way for improving our cyber security Adrian Furtunǎ, PhD, OSCP, CEH [email protected] Copyright The OWASP

More information

Social-Engineering. Hacking a mature security program. Strategic Penetration Testing

Social-Engineering. Hacking a mature security program. Strategic Penetration Testing Social-Engineering Hacking a mature security program Strategic Penetration Testing Dave Kennedy (ReL1K) http://www.secmaniac.com twitter: Dave_ReL1K A Mature Security Program. Companies have invested a

More information

IT HEALTHCHECK TOP TIPS WHITEPAPER

IT HEALTHCHECK TOP TIPS WHITEPAPER WHITEPAPER PREPARED BY MTI TECHNOLOGY LTD w: mti.com t: 01483 520200 f: 01483 520222 MTI Technology have been specifying and conducting IT Healthcheck s across numerous sectors including commercial, public

More information

Enterprise Cybersecurity: Building an Effective Defense

Enterprise Cybersecurity: Building an Effective Defense : Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced

More information

Penetration Test Report

Penetration Test Report Penetration Test Report MegaCorp One August 10 th, 2013 Offensive Security Services, LLC 19706 One Norman Blvd. Suite B #253 Cornelius, NC 28031 United States of America Tel: 1-402-608-1337 Fax: 1-704-625-3787

More information

Measuring Real-World Accuracies and Biases in Modeling Password Guessability

Measuring Real-World Accuracies and Biases in Modeling Password Guessability Measuring Real-World Accuracies and Biases in Modeling Password Guessability Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, and Darya Kurilova, Carnegie

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Web Application Guidelines

Web Application Guidelines Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security

More information

The Security Gap. Philip Young aka Soldier of Fortran @mainframed767

The Security Gap. Philip Young aka Soldier of Fortran @mainframed767 The Security Gap Philip Young aka Soldier of Fortran @mainframed767 DISCLAIMER All research was done under personal time. I am not here in the name of, or on behalf of, my employer. Any views expressed

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team

What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information

More information

What is Penetration Testing?

What is Penetration Testing? White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking

More information

Web Security. Crypto (SSL) Client security Server security 2 / 40. Web Security. SSL Recent Changes in TLS. Protecting the Client.

Web Security. Crypto (SSL) Client security Server security 2 / 40. Web Security. SSL Recent Changes in TLS. Protecting the Client. 1 / 40 Crypto () Client security Server security 2 / 40 Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics

More information

Distributed Password Cracking with John the Ripper

Distributed Password Cracking with John the Ripper Distributed Password Cracking with John the Ripper Computer Security Tufts Comp116 Author: Tyler Lubeck Email: [email protected] Mentor: Ming Chow Contents Abstract... 2 Introduction... 3 To the Community...

More information

Loophole+ with Ethical Hacking and Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,

More information

Topic 1 Lesson 1: Importance of network security

Topic 1 Lesson 1: Importance of network security Topic 1 Lesson 1: Importance of network security 1 Initial list of questions Why is network security so important? Why are today s networks so vulnerable? How does Melissa virus work? How does I love you

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Grandstream Networks, Inc. UCM6100 Security Manual

Grandstream Networks, Inc. UCM6100 Security Manual Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL

More information

Penetration: from Application down to OS

Penetration: from Application down to OS April 13, 2010 Penetration: from Application down to OS Getting OS Access Using Lotus Domino Application Server Vulnerabilities Digitаl Security Research Group (DSecRG) www.dsecrg.com Alexandr Polyakov.

More information

Cracking Passwords in Forensic Investigations: Cost Implications

Cracking Passwords in Forensic Investigations: Cost Implications Cracking Passwords in Forensic Investigations: Cost Implications Vishal Bulland Bachelor of Computer Science (Pune University, India) a thesis submitted to the graduate faculty of design and creative technologies

More information

Cyber Security. Maintaining Your Identity on the Net

Cyber Security. Maintaining Your Identity on the Net Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD

More information

WEB FOR PENTESTER II By Louis Nyffenegger <[email protected]>

WEB FOR PENTESTER II By Louis Nyffenegger <Louis@PentesterLab.com> WEB FOR PENTESTER II By Louis Nyffenegger Table of Content Table of Content Introduction About this exercise License Syntax of this course The web application Introduction SQL

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

0days: How hacking really works. V 1.0 Jan 29, 2005 Dave Aitel [email protected]

0days: How hacking really works. V 1.0 Jan 29, 2005 Dave Aitel dave@immunitysec.com 0days: How hacking really works V 1.0 Jan 29, 2005 Dave Aitel [email protected] Who am I? NSA->@stake->Immunity CEO of Immunity, Inc. Consulting (product assessments) Immunity CANVAS Immunity Partner's

More information

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur Demystifying Penetration Testing for the Enterprise Presented by Pravesh Gaonjur Pravesh Gaonjur Founder and Executive Director of TYLERS Information Security Consultant Certified Ethical Hacker (CEHv8Beta)

More information

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology. CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net

More information

Still Aren't Doing. Frank Kim

Still Aren't Doing. Frank Kim Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding

More information

Jeremi M Gosney Founder & CEO, Stricture Consulting Group

Jeremi M Gosney Founder & CEO, Stricture Consulting Group Jeremi M Gosney Founder & CEO, Stricture Consulting Group Passwords^12 Security Conference December 3, 2012 The Problem Password crackers need more power! Yes, really. A GPU is great! More GPUs are better.

More information

Secure Passwords Through Enhanced Hashing

Secure Passwords Through Enhanced Hashing Secure Passwords Through Enhanced Hashing Benjamin Strahs Chuan Yue Haining Wang Department of Computer Science The College of William and Mary Williamsburg, VA 23187, USA {bgstra,cyue,hnw}@cs.wm.edu Abstract

More information

Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things:

Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: SHA-1 Versus SHA-2 Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: - Breaking SHA-1 is not yet practical but will

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

Rainbow Cracking: Do you need to fear the Rainbow? Philippe Oechslin, Objectif Sécurité. OS Objectif Sécurité SA, Gland, www.objectif-securite.

Rainbow Cracking: Do you need to fear the Rainbow? Philippe Oechslin, Objectif Sécurité. OS Objectif Sécurité SA, Gland, www.objectif-securite. ainbow Cracking: Do you need to fear the ainbow? Philippe Oechslin, Objectif Sécurité 1 On the menu 1. ainbow tables explained 2. Who is vulnerable 3. Tools and history 4. What you should do about it 2

More information

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

What IT Auditors Need to Know About Secure Shell. SSH Communications Security What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic

More information

Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to:

Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to: Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical hacker Describe what you can do legally as an ethical hacker Describe what you can

More information

2015 VORMETRIC INSIDER THREAT REPORT

2015 VORMETRIC INSIDER THREAT REPORT Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security RETAIL EDITION #2015InsiderThreat RESEARCH BRIEF RETAIL CUSTOMERS AT RISK ABOUT THIS RESEARCH BRIEF

More information

Pass-the-Hash II: Admin s Revenge. Skip Duckwall & Chris Campbell

Pass-the-Hash II: Admin s Revenge. Skip Duckwall & Chris Campbell Pass-the-Hash II: Admin s Revenge Skip Duckwall & Chris Campbell Do you know who I am? Skip Co-presented PTH talk last year at BH, Derbycon http://passing-the-hash.blogspot.com @passingthehash on twitter

More information