Cracking 400,000 Passwords. Matt Weir Sudhir Aggarwal Florida State University
|
|
|
- Marlene Brown
- 9 years ago
- Views:
Transcription
1 Cracking 400,000 Passwords Matt Weir Sudhir Aggarwal Florida State University
2 Special Thanks: Dr. Sudhir Aggarwal Professor Breno de Medeiros National Institute of Justice National White Collar Crime Center
3 My Research Assist Law Enforcement Develop better ways to model how people actually create passwords Investigate how we can make passwords more secure FORENSICS I M CRACKING PASSWORDS CRACKING PASSWORDS
4 What I m going to try and avoid focusing on... Tools Trivia
5 For Tools and Trivia... My Research Blog - Tools Page -
6 And Certainly Not... OMG Passwords Suck! Users are stupid! We re all doomed! PW CRACKER
7 The Main Goal What does a password cracking session look like? What steps go into cracking a password list?
8 The Plan 1.Password Cracking Basics, (for the CISSPs out there) 2.Cracking the phpbb.com list 3.Cracking the webhostingtalk.com list 4.Breakout Room: Questions + Dealing with TrueCrypt, pass-phrases and non-standard passwords
9 Password Cracking Basics
10 Two Types of Password Cracking Online - The system is still operational - You may only be allowed a few guesses Offline - You grabbed the password hash - Computer forensics setting
11 Cracking Passwords Step 1) Create a password guess
12 Cracking Passwords Step 1) Create a password guess password123
13 Cracking Passwords Step 2) Hash the Guess password123
14 Cracking Passwords Step 2) Hash the Guess 52F8A73082B1290
15 Cracking Passwords Step 3) Compare it against the target hash 52F8A73082B1290
16 Cracking Passwords Step 3) Compare it against the target hash 52F8A73082B1290 = 82503CA693453D1
17 Cracking Passwords Step 3) Compare it against the target hash 52F8A73082B1290 = 82503CA693453D1
18 Cracking Passwords Step 1... again) Make another guess monkey123
19 Password Salts Salts are a value added to a password to make it harder to crack For example, you could add the username - MD5( bob + defcon ) - 09f20200fe8131d e916381d04 - MD5( tom + defcon ) - b19263f7cadf7a03ee644ad60591a91c In real life, use a RANDOM value
20 Password Salts (cont.) Important Points - Not secret - User does not need to know it. - Should be unique per user - If the attacker is only targeting one user, it only prevents against hash lookup attacks
21 Now on to the Cracking!
22 Original Hardware Setup GHz Core Duo - 3 Gigs of Ram - NVIDEA GeForce 8800 GTS
23 Then the Power-bill Arrived... Our power bill had gone up by about 75% There were other causes as well but that s a hard conversation to have... Picture of Power Bill Removed to Avoid Further Annoying My Roommate, (the power bill is in his name)
24 Current Hardware Setup
25 The Phpbb.com List Development site for the phpbb forum software Originally Hacked Jan 14th 2009 List was posted online early February
26 Details About the List Contained 259k unsalted MD5 password hashes Also had 83k salted hashes using the phpbb3 hashing algorithm We only attacked the MD5 hashes
27 The Hacker s Attack The hacker had attempted to crack 117k of the password list Used an online web-cracker over a one to two week period Cracked 28,635 passwords, aka 24% of them
28 Comparing Online Password Crackers Most online password crackers crack around 20-40% of passwords submitted to them MD5-utils will submit password hashes to many of the online sites
29 Existing Password Crackers John the Ripper Cain & Able L0phtcrack Access Data s PRTK
30 John the Ripper Source-code is available If you can think of it, it s probably been done in JtR
31 My Favorite Option in JtR -STDIN
32 Make Sure You Check For Updates... Older versions of JtR choke when passed a large password list There was a patch, but I didn t realize it until later...
33 Time it took to crack, (even with JtR problems) 4 hours - 38% of the passwords cracked 1 week - 62% of the passwords cracked 1 month + 1 week - 89% of the passwords cracked Currently - 95% of the total passwords cracked - 93% of the unique MD5 hashes
34 Other Results Brandon Enright - 95% of the MD5 hashes cracked - He cracked 2,525 unique hashes that I missed - I ve cracked 2,677 unique hashes that he missed
35 Some Quick Statistics - Average Length: 7.2 characters long - Only 6% of them contained an UPPERCASE letter - Only 1% of them contained a special character! - 51% contained only lowercase letters Note: Does not include the 5% of the passwords we have not cracked - duh
36 Limited Resources Unless we re attacking LANMAN, we re limited in the time we can spend Therefore, we have to choose between different attack strategies When you just don t have the time to mess around We can t just try everything
37 Creating Strong Passwords It s easy for an individual to create a strong password - Just do something unique It s much harder to get everyone to be unique
38 Dictionary Attacks Take a dictionary word Mangle it to your heart s content
39 Reasons A Dictionary Attack can Fail You didn t try the right dictionary word You didn t try the right word mangling rule
40 Choosing an Input Dictionary... or 40 People tend to go a bit overboard collecting input dictionaries After a while it starts to resemble brute force
41 If No Password Creation Rules Were Enforced Larger input dictionaries are better Check out a wordlist made from every wiki article, at Sebastien Raveau s blog -
42 When there was a Password Creation Policy Smaller more targeted wordlists are better The best are based on previously cracked passwords
43 Word Mangling Rules Learn new ones from previously cracked passwords I ve made some of my JtR rules available for download Minga also posted some online
44 Probabilistic Cracking Some words are more likely than others - password, monkey, football Some mangling rules are more likely than others - 123, 007, $$$, Capitalize the first letter
45 Which Should We Try First? A common word with an uncommon mangling rule? - 13!password13! An uncommon word with a common mangling rule? - zebra123
46 Our Probabilistic Cracker Assigns a probability to just about everything - dictionary words - word mangling rules - specific replacements, aka two digits go to 12
47 Time for a Quick Demo
48 Brute Force Like most things, really powerful if you re not stupid about it
49 Letter Frequency Analysis The most basic bruteforce optimization Very useful for figuring out what letters/ symbols not to try
50 Markov Models Conditional probability of letters Brute forces human like words Used in JtR s Incremental mode
51 Targeted Brute Force People tend to capitalize the first letter They generally put numbers at the end of passwords For this case, people liked using the words php or phpbb in their passwords Check out the new version of the tool Crunch - Check the programming forum on the remote-exploit.com
52 An Example:./john -incremental=alpha -stdout -session=t1
53 An Example:./john -incremental=alpha -stdout -session=t1 Create guesses using JtR s Markov models. bara sandy shanda sandall starless dog bony bool boon stark start stack stace steve stevy stech steck sanda marine maring marian mariah marley marler
54 An Example:./middleChild -cap first -append s1d1
55 An Example:./middleChild -cap first -append s1d1 Capitalize the first letter Add a special character and digit to the end Bara!1 Bara!2 Bara!0 Bara!3 Bara!4... Sandy!1 Sandy!2 Sandy!0 Sandy!3 Sandy!4... Shanda!1 Shanda!2 Shanda!0 Shanda!3 Shanda!4... Sandall!1 Sandall!2 Sandall!0 Sandall!3 Sandall!4...
56 An Example:./john -stdin -hash=raw-md5./hashes.txt
57 An Example:./john -stdin -hash=raw-md5./hashes.txt Now pipe everything back into JtR so we can actually try to crack the hashes
58 Cracking the Web Hosting Talk List Originally hacked March 21st, 2009 Over 200k salted hashes were stolen
59 Don t Worry Though... Passwords are hashed with salt. It would be an unprecedented event to reverse engineer our passwords. I change my password periodically though, so maybe today is a good day for that. - SoftWareRevue inet Community Coordinator
60 Oh, and... Absolutely no credit card or PayPal data was compromised. - SoftWareRevue inet Community Coordinator
61 Stuff Happens... Web Hosting Talk was compromised again by the same hacker on April 7th The hacker posted 202k password hashes + 2,218 credit card numbers
62 I want to make this clear People get hacked. I m not blaming Web Hosting Talk for that. Getting someone out of your system once they compromised it is also a tough problem. What I do have a problem with is Web Hosting Talk downplaying the risks that their users faced
63 One Interesting Fact Number of users who changed their password after the first attack That s less than 1% of the total - 0.6% to be exact
64 So How Unbreakable is This Hash? First we need to figure out what the forum software is Google Web Hosting Talk Forum Software Yes. It's vbulletin. - SoftWareRevue inet Community Coordinator
65 What Hashing Algorithm does vbulletin use? Google to the rescue again... MD5(MD5(Password).salt)
66 So How Should We Test It? The Hash is blocked to protect the users 1109 People used the password password
67 But what about the Salt It s a major problem Since each user s salt is different, we have hash each password guess for each user Compare it to the PhpBB attack - Assume you spent 1 hour attacking the PhpBB list - It would take you 200,000 hours to to run the same attack on the Web Hosting Talk list
68 That Being Said I ve still managed to crack 34% of the passwords A majority of them were cracked using a list of previously cracked passwords from other sites, (no word mangling rules). Did you know people use the same password on more than one site?
69 The Salt Doesn t Protect Individual Users Don t post your hash online claiming it is unbreakable It s possible to set up attacks to only target people with the words admin or webmaster in their e- mail address
70 Questions/Comments? My Research Blog - Tools Page - Address - [email protected]
71 Dealing with Other Types of Passwords Note: The following slides were not covered in the actual talk due to time constraints
72 Cracking Pass-Phrases The main problem is we don t have many examples of pass-phrases One approach 1.Use an input dictionary of phrases -!!It s fun to try the impossible!
73 Cracking Pass-Phrases The main problem is we don t have many examples of pass-phrases One approach 1.Use an input dictionary of phrases -!!ifttti!
74 Cracking Pass-Phrases 2.Use a Mad Libs Approach - Proper-Noun verbs a Noun - Proper-Noun loves Proper-Noun
75 Cracking Graphical Passwords People sometimes use ASCII art for their passwords /><{{{{"> ///\oo/\\\ d[ o_0 ]b (^_-) ~ ~ <===3 -- fish -- spider -- robot -- rocket ship?!
76 Solution... I ve created some input dictionaries of ASCII art to use Probably the largest collection of NSFW ASCII art on the internet...
77 Targeted Attacks Assign higher probabilities to certain replacements - Kids names - Birth Years - Zip Codes Check out CUPP from the remote-exploit group
78 Perl Monks Statistics Disclosed in the ZF05 Data-set this Wednesday - Average Length: Also 7.2 characters long - 30% of them contained an UPPERCASE letter - Close to 8% of them contained a special character - 40% of them contained only lowercase letters
Cracking Salted Hashes
Overview: Cracking Salted Hashes Web Application Security: - The Do s and Don ts of Salt Cryptography Data Base security has become more critical as Databases have become more open. And Encryption which
Your Password Complexity Requirements are Worthless. Rick Redman KoreLogic www.korelogic.com
Your Password Complexity Requirements are Worthless Rick Redman KoreLogic www.korelogic.com Introduction Rick Redman < [email protected] > 88FB D23C 5AC1 8756 5690 6661 A933 6E99 4E2C EF75 Penetration
Rainbow Cracking: Do you need to fear the Rainbow? Philippe Oechslin, Objectif Sécurité. OS Objectif Sécurité SA, Gland, www.objectif-securite.
ainbow Cracking: Do you need to fear the ainbow? Philippe Oechslin, Objectif Sécurité 1 On the menu 1. ainbow tables explained 2. Who is vulnerable 3. Tools and history 4. What you should do about it 2
Password Cracking Beyond Brute-Force
Password Cracking Beyond Brute-Force by Immanuel Willi Most password mechanisms work by comparing a password against a stored reference value. It is insecure to store the whole password, so one-way functions
Distributed Password Cracking with John the Ripper
Distributed Password Cracking with John the Ripper Computer Security Tufts Comp116 Author: Tyler Lubeck Email: [email protected] Mentor: Ming Chow Contents Abstract... 2 Introduction... 3 To the Community...
Protecting against modern password cracking
Protecting against modern password cracking Are passwords still an adequate form of authentication? by Yiannis Chrysanthou, MSc (RHUL, 2012), and Allan Tomlinson (supervisor), ISG, Royal Holloway istockphoto/ronen
Cyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
How can I keep my account safe from hackers, scammers and spammers?
How can I keep my account safe from hackers, scammers and spammers? The question is a good one and especially important if you've purchased shared hosting (such as HostDime offers) since what effects your
Digital evidence obfuscation: recovery techniques
To appear in Proceedings of the Society for Optical Engineering Conference. Orlando, FL. Digital evidence obfuscation: recovery techniques J. Philip Craiger* a, Jeff Swauger b, Chris Marberry b a National
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
Authenticating Humans
29 Oct 2015 CSCD27 Computer and Network Security Authenticating Humans CSCD27 Computer and Network Security 1 Authenticating Computers and Programs Computers and programs need to authenticate one another:
PASSWORD ATTACKS AND GENERATION STRATEGIES
PASSWORD ATTACKS AND GENERATION STRATEGIES Predrag Tasevski Tartu University, Faculty of Mathematics and Computer Sciences, major: Master of Science in Cyber Security Abstract. Nowadays, attacking the
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Understanding Passwords. Nigel Pentland National Australia Group Room: Nurburgring Session: DB
Understanding Passwords Nigel Pentland National Australia Group Room: Nurburgring Session: DB Nigel Pentland Senior Security Analyst [email protected] 0141 223 3179 Road Safety analogy Accidents
Password Manager with 3-Step Authentication System
Password Manager with 3-Step Authentication System Zhelyazko Petrov, Razvan Ragazan University of Westminster, London [email protected], [email protected] Abstract: A big
GENEVA COLLEGE INFORMATION TECHNOLOGY SERVICES. Password POLICY
GENEVA COLLEGE INFORMATION TECHNOLOGY SERVICES Password POLICY Table of Contents OVERVIEW... 2 PURPOSE... 2 SCOPE... 2 DEFINITIONS... 2 POLICY... 3 RELATED STANDARDS, POLICIES AND PROCESSES... 4 EXCEPTIONS...
A state-of-the-art password strength analysis demonstrator
A state-of-the-art password strength analysis demonstrator by Nico van Heijningen (0821976) CMI-Program Technical Informatics Rotterdam University June 26, 2013 First supervisor Second supervisor Dhr.
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation. *solve: to find a solution, explanation, or answer for
The 5 P s in Problem Solving 1 How do other people solve problems? The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation *solve: to find a solution, explanation, or answer
Boston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
Attacking NTLM with Precomputed Hashtables
Attacking NTLM with Precomputed Hashtables warlord [email protected] Contents 1 Introduction 2 2 The design of LM and NTLM 3 2.1 The LanMan disaster......................... 3 2.2 NTLM.................................
AC 2009-1697: EXPERIMENTS WITH COMPUTER PASSWORD CRACKING AND SHIELDING TECHNIQUES
AC 2009-1697: EXPERIMENTS WITH COMPUTER PASSWORD CRACKING AND SHIELDING TECHNIQUES Veeramuthu Rajaravivarma, State University of New York, Farmingdale V. Rajaravivarma is currently with the Electrical
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
PaymentNet Federal Card Solutions Cardholder FAQs
PaymentNet Federal Card Solutions It s easy to find the answers to your questions about PaymentNet! June 2014 Frequently Asked Questions First Time Login How do I obtain my login information?... 2 How
Building Better Passwords using Probabilistic Techniques
Building Better using Probabilistic Techniques Shiva Houshmand Florida State University Department of Computer Science Tallahassee, FL 32306-4530 1 (850) 645-7339 [email protected] Sudhir Aggarwal Florida
SPICE EduGuide EG0015 Security of Administrative Accounts
This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
1 WARMER Complete the sentences using your own words. Use a dictionary to help you. Girls are. Boys are.
1 WARMER Complete the sentences using your own words. Use a dictionary to help you. Girls are. Boys are. 2 WHAT DOES IT MEAN? Write the words next to their meanings. These words will help you understand
Planning a Successful Facebook Fan Promotion
Planning a Successful Facebook Fan Promotion 10 things you need to do to make your campaign a success 2014 Copyright Constant Contact, Inc. 14-3931 v1.0 Helping Small Business Do More Business What is
Managing Your Class. Managing Users
13 Managing Your Class Now that we ve covered all the learning tools in Moodle, we ll look at some of the administrative functions that are necessary to keep your course and students organized. This chapter
NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
Pentesting for fun... and profit! David M. N. Bryan and Rob Havelt
Pentesting for fun... and profit! David M. N. Bryan and Rob Havelt Agenda Who are David & Rob? Why are we experts? Why do penetration tests? What is a penetration test? What is the goal? Some says it s
Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab
Techniques of Asymmetric File Encryption Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Abstract As more and more people are linking to the Internet, threats to the
Written & Presented by Darren Fuller SecQuest Information Security Ltd.
SecQuest INFORMATION SECURITY 44Con 2012: Toppling Domino Testing security in a Lotus Notes environment Written & Presented by Darren Fuller SecQuest Information Security Ltd. About this Presentation This
SECURING YOUR REMOTE DESKTOP CONNECTION
White Paper SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY SECURE REMOTE ACCESS 2015 SecurityMetrics SECURING YOUR REMOTE DESKTOP CONNECTION 1 SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY
Understand What s Going On
Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud
EPISODE 02: HOW TO FAST FORWARD YOUR EMAIL LIST GROWTH
EPISODE 02: HOW TO FAST FORWARD YOUR EMAIL LIST GROWTH! 1 of 18! Tell me if you ve done this before HOW TO FAST FORWARD YOUR EMAIL LIST GROWTH Come up with a brilliant idea. Go into hiding while you create
Passwords the server side
Passwords the server side A tour of decreasingly bad ideas regarding server-side password handling. Thomas Waldmann @ EuroPython 2013 Disclaimer I am not a crypto or security expert, just a caring developer
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 837-841 International Research Publication House http://www.irphouse.com Enhancing Cloud Security
The State of Modern Password Cracking
SESSION ID: PDAC-W05 The State of Modern Password Cracking Christopher Camejo Director of Threat and Vulnerability Analysis NTT Com Security @0x434a Presentation Overview Password Hashing 101 Getting Hashes
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
CS 161 Computer Security
Paxson Spring 2013 CS 161 Computer Security Homework 2 Due: Wednesday, March 6, at 10PM Version 1.1 (02Mar13) Instructions. This assignment must be done on your own, and in accordance with the course policies
An Introduction on How to Better Protect Your Computer and Sensitive Data
An Introduction on How to Better Protect Your Computer and Sensitive Data Common Security Problems Computer users who fail to use strong passwords Constant attacks by viruses, worms, key loggers and bots
THE PENNSYLVANIA STATE UNIVERSITY OFFICE OF HUMAN RESOURCES PASSWORD USAGE POLICY
THE PENNSYLVANIA STATE UNIVERSITY OFFICE OF HUMAN RESOURCES PASSWORD USAGE POLICY 1.0 Purpose The purpose of this policy is to establish Office of Human Resources (OHR) standards for creation of strong
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Network Security In Linux: Scanning and Hacking
Network Security In Linux: Scanning and Hacking Review Lex A lexical analyzer that tokenizes an input text. Yacc A parser that parses and acts based on defined grammar rules involving tokens. How to compile
things you haven t done to protect your business from cybercrime
5 things you haven t done to protect your business from cybercrime 5 things you can do to protect your business from cybercrime 27,000,000,000 27billion is a big number and is what the UK government estimates
Cracking Passwords in Forensic Investigations: Cost Implications
Cracking Passwords in Forensic Investigations: Cost Implications Vishal Bulland Bachelor of Computer Science (Pune University, India) a thesis submitted to the graduate faculty of design and creative technologies
Attack Frameworks and Tools
Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Mobile Banking Frequently Asked Questions
Registration and Activation FAQs Why do I have to register my phone? Mobile devices must be enrolled to use First Federal Lakewood in order to securely validate that only your device has access to your
Desktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
A Study on the Categorization of Webshell. Jae Chun, Lee([email protected])
A Study on the Categorization of Webshell Jae Chun, Lee([email protected]) Agenda Part1 - Introduce Webshell Part2 - Advantage and disadvantage of WebShell Profiling Part3 Criteria Categorization of WebShell
CIS 8630. Business Computer Forensics and Incident Response. Lab Protocol 06: Password Cracking with Cain and Abel
CIS 8630 Business Computer Forensics and Incident Response Lab Protocol 06: Password Cracking with Cain and Abel Purpose: Ensure every student gains first-hand experience with password cracking tools.
User Identity and Authentication
User Identity and Authentication WordPress, 2FA, and Single Sign-On Isaac Potoczny-Jones [email protected] http://tozny.com About the Speaker Galois, Inc. - @galoisinc. Research & Development for computer
PASSWORD CRACKING BASED ON LEARNED PATTERNS FROM DISCLOSED PASSWORDS. Received December 2011; revised April 2012
International Journal of Innovative Computing, Information and Control ICIC International 2013 ISSN 1349-4198 Volume 9, Number 2, February 2013 pp. 821 839 PASSWORD CRACKING BASED ON LEARNED PATTERNS FROM
White Paper. Options for Two Factor Authentication. Authors: Andrew Kemshall Phil Underwood. Date: July 2007
White Paper Options for Two Factor Authentication Authors: Andrew Kemshall Phil Underwood Date: July 2007 Page 1 Table of Contents 1. Problems with passwords 2 2. Issues with Certificates (without Smartcards)
Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy
Presentation for : The New England Board of Higher Education Hot Topics in IT Security and Data Privacy October 22, 2010 Rocco Grillo, CISSP Managing Director Protiviti Inc. Quote of the Day "It takes
Tax and Accounting Document Delivery
Tax and Accounting Document Delivery Encrypting PDF Files in Email Attachments: Reduce Risk, Automation and Compliance Administrative Items 90 Minutes (Education, Demo, Q&A) Participants are muted. Please
How to Create and Maintain an Anonymous Identity Online
How to Create and Maintain an Anonymous Identity Online By Anonymous33 Email: [email protected] Revision 1 Date: 23/03/2011 WARNING: The information contained in this guide is for educational and protection
SEO Education 101. By Matt Bush. Visit http://immattbush.com for the latest internet marketing tips and tactics
1 SEO Education 101 By Matt Bush 2 CONTENTS SEO: Search Engine Optimization Introduction... 4 The Advantages of SEO... 5 Search Engine Basics... 5 The Importance Of The Domain Name... 6 The Importance
Palliser Regional Schools. Summary of feedback
Palliser Regional Schools Palliser Centre #101, 3305-18 Avenue North, Lethbridge, AB T1H 5S1 Phone: 403-328-4111 Toll-free: 877-667-1234 Fax: 403-380-6890 www.pallisersd.ab.ca Summary of feedback Community
isupplygw Site Login Troubleshooting
Site Login Troubleshooting Tips User name is administrator s email address Password requirements: o Passwords must be at least 8 characters long and can be as long as 30 characters. o Passwords must contain
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Top 10 Security Checklist for SOHO Wireless LANs
Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN
Describe the action you took in this cycle.
Describe the action you took in this cycle. 1. The What s for Lunch? Unit Plan Cycle Two s unit plan (See Appendix E for specific learning activities) centered on a theme titled WHAT S FOR LUNCH? First
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Wholesaling Lease Options FREE Bonus
Wholesaling Lease Options FREE Bonus The Best Internet Tools I Use In My Real Estate Business That You Might Never Have Heard Of! I am a huge fan of using technology that WORKS and that makes my life EASIER.
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions
Security Awareness For Server Administrators State of Illinois Central Management Services Security and Compliance Solutions Purpose and Scope To present a best practice approach to securing your servers
Better Safe Than Sorry
Better Safe Than Sorry Security and OS X [email protected] SECURITY An Unexpectedly long Journey Agenda Threats Protection Configurations Best Practices? Let s talk security Distrust and causion are
HOW TO SHOP FOR A WEB DEVELOPER
HOW TO SHOP FOR A WEB DEVELOPER 10 QUESTIONS YOU SHOULD ASK Brought to you by PIXEL ME PINK PART1... HOW TO SHOP FOR A WEB DEVELOPER Step 1 What kind of professional is right for me? Step 2 Find someone
So you thought I couldn't get in?
So you thought I couldn't get in? Compromising ISP issued 802.11 wireless cable modem networks for profit. By: GuerrillaWarfare Email: [email protected] Company: WarGamesLabs Twitter: https://twitter.com/guerrillawf
Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals
Five Steps to Improve Internal Network Security Chattanooga Information security Professionals Who Am I? Security Analyst: Sword & Shield Blogger: averagesecurityguy.info Developer: github.com/averagesecurityguy
Password Depot for Android
Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening
SQL INJECTION TUTORIAL
SQL INJECTION TUTORIAL A Tutorial on my-sql Author:- Prashant a.k.a t3rm!n4t0r C0ntact:- [email protected] Greets to: - vinnu, b0nd, fb1h2s,anarki, Nikhil, D4Rk357, Beenu Special Greets to: - Hackers
THE LITTLE BIG BOOK OF BADNESS
THE LITTLE BIG BOOK OF BADNESS How to stay safe on the Internet a guidebook for students and parents USE THIS BOOK TO FIND OUT HOW YOU AND YOUR COMPUTER CAN STAY AWAY FROM BAD THINGS 2 CONTENTS Why you
ONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
How to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
DoD Cyber Crime Center
DoD Cyber Crime Center (DC3) Digital Forensics Challenge 2013 Team Northrop Grumman April 30, 2014 Jesse Mayer Northrop Grumman Cyber Security Operations Center DC3 Digital Forensics Challenge Annual Competition
1. What aspects of your job do you enjoy? Please explain. The people coming in and out of the office constantly.
1. What aspects of your job do you enjoy? Please explain. The people coming in and out of the office constantly. I especially like the fact that I can do homework and interact with people. My co-workers/boss
