AC : EXPERIMENTS WITH COMPUTER PASSWORD CRACKING AND SHIELDING TECHNIQUES
|
|
|
- Stephen Daniel Banks
- 9 years ago
- Views:
Transcription
1 AC : EXPERIMENTS WITH COMPUTER PASSWORD CRACKING AND SHIELDING TECHNIQUES Veeramuthu Rajaravivarma, State University of New York, Farmingdale V. Rajaravivarma is currently with the Electrical and Computer Engineering Technology at SUNY, Farmingdale State College. Previously, he was with Tennessee State University,Morehead State University, North Carolina A&T State University, and Central Connecticut State University. Dr. Rajaravivarma teaches electronics, communication, and computer networks courses to engineering technology students. His research interest areas are in the applications of computer networking and digital signal processing. Cajetan Akujuobi, Prairie View A&M University Dr. Akujuobi is a Professor of Electrical Engineering and the founding Director of the DSP Solutions, Mixed Signal Systems and Broadband Access Technologies Programs and Laboratories at Prairie View A&M University. He is also the founding Director of the Center of Excellence for Communication Systems Technology Research (CECSTR). His research interests include High-Speed (Broadband) Communication Systems, Mixed Signal Systems and DSP Solutions. He is also the Department Head for Engineering Technology at Prairie View A&M University. American Society for Engineering Education, 2009 Page
2 Experiments with Computer Password Cracking and Shielding Techniques Abstract Internet is dominating almost every aspect of our life. Internet applications are too many in today s business world. It is hard to imagine any office or home without a computer network. All kinds of money transactions are possible today because of the fast changes in computer technology. As a result, everyone with an online account can buy or sell anything over the Internet in a secured environment. Therefore, it is important to secure the computer with the easy username and an unbreakable password. This topic can be integrated into anyone of the Computer Networks or Network Security courses for undergraduate students majoring in Computer Engineering Technology. This paper explains the importance of secured password and examines the kinds of passwords that are breakable. The password cracking uses simple open source software tools available in the Internet. In addition, this paper also discusses different types of password related attacks and password shielding techniques. Summary of the experimental results are also provided for different passwords with various lengths, characters, and complexity. 1. Introduction Internet has allowed remote access to any organization in the world anytime of the day or night. This generated lot of attention around the world and easy way of entering into anyone s network was made possible. At the same time easy access to open source software codes allowed the computer hackers to grow in numbers and get smarter. Password security has become more important part of today s computer network. Although the security of a password encryption algorithm is an intellectual and mathematical problem, it is only one tiny facet of a very large problem [1]. It has become a common practice in every organization that computer system administrators are constantly looking for new ways to protect and better the password. There are several ways of building a secured system and also keep up with the hardware speeds and software updates [2]. In general passwords have always been the primary security to authenticate entry and to keep away unwanted people from gaining access to the network. Password guessing attacks can be categorized by the amount of interaction they require with an authentication system [2]. In on-line attacks, the perpetrator must make use of an authentication system to check each guess of a password. In off-line attacks, an attacker obtains information--such as a password hash--that allows him to check password guesses on his own, with no further access to the system. On-line attacks are generally considerably slower than off-line ones. Systems can detect on-line attacks fairly easily and defend against them by slowing the rate of password checking and limiting the number of tries to crack the password. In contrast, once an attacker has obtained password verification information, the only protection a system has from off-line attacks is the computational cost of checking potential passwords. Page
3 2. Password Cracking There are many kinds of passwords in the computer world [3]. The most commonly used and attacked are passwords used to logon to a machine or domain. In a domain environment all of the usernames and passwords are kept on a domains controller. This allows administrators to secure physical access to the machine. However when a machine joins a domain it still must have a local administrator account. This can allow hackers a staging point to attack other network devices. Password cracking in a workgroup or stand alone machine is easy as long as one has physical access to the machine. For remote users, as long as one can hack into the router, it is also easy to sniff passwords. In this case the remote connection software becomes the primary way of grabbing username and passwords sent over public network. Domain Password Cracking is much harder and needs physical access to one machine and the local administrator account. There are numerous password crackers available openly in the Internet. Based on the release of the 2006 survey [4], the top 10 password crackers are Cain and Abel, John the Ripper, THC Hydra, Aircrack, L0phtcrack (LC4), Airsnort, SolarWinds, Pwdump, Rainbow Crack, and Brutus. Cain and Abel - This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. John the Ripper - A powerful, flexible, and fast multi-platform password hash cracker THC Hydra - Fast network authentication cracker which support many different services Aircrack The fastest available wireless cracking tool L0phtcrack - Windows password auditing and recovery application (LC 4 and LC5). Airsnort Wireless LAN tool that recovers encryption keys SolarWinds - Network discovery/monitoring/attack tools for system administrators Pwdump - Widows password recovery tool capable of displaying password histories Rainbow Crack - Innovative password hash cracker tool that makes use of a largescale time-memory trade-off Brutus - Windows-only cracker uses network brute-force authentication Based on the experiment done using the available OPH Crack tool for Windows based system [5], it was shown to crack alphanumerical passwords in seconds. Page
4 Password Cracking Experiments In our case, the main objective of the classroom experiments is to see what kinds of passwords are breakable. In addition our students also learn to use the existing software tools and more importantly to use it for a productive purpose. Our students also learn to manage the domain as a system administrator. To add the pedagogic value of peerlearning, students are encouraged to do the hands-on experiments in teams where one student comes with the password and other tries to break it These experiments can be conducted in any networking laboratory set up with available free open source software tools. It is strongly recommended to consult with the school system administrator before conducting this experiment to know more about security threats. Make sure to enforce the rule to turn off the Internet connection while conducting the experiment. Students should have exposure to basic networking and fundamentals of computer security before doing these experiments. In our class, the experiments were conducted in a Windows environment laboratory without Internet connection. We chose two popular open source password cracking software tools L0phtcrack (LC4) [6] and SAM Inside [7] for our experiments. As noted above, LC4 is a password auditing and recovery application tool. It provides two critical capabilities to Windows network administrators, (1) to secure Windows-authenticated networks through comprehensive auditing of Windows NT and Windows 2000 user account passwords (2) to recover Windows user account passwords to streamline migration of users to another authentication system or to access accounts whose passwords are lost. SAM Inside is another password recovery program used in the experiment which can crack passwords much faster than LC4 and the core part of the program is written in assembly language. This program also supports Mask attack, Dictionary attack, Hybrid attack, and Attack with Rainbow tables. All the experiments were conducted in Windows environment computers and students were able to login as administrators. The demo versions of both software tools have limited access with few testing features. For instance, LC4 demo version can not perform Brute Force attack where as this is possible with SAMInside demo version. Following steps were performed during the experiments: Download software tools demo versions LC4 [5] and SAMInside [6] Create several accounts with passwords. Select Start Control Panels Account Users Add new user and set password. Create four accounts with usernames Arthur, Boxworthy, Carmella, and Dixon o 4 local users Username Arthur; Password up77 Username Boxworthy; Password b0xw0rthy Username Camela; Password Arthur Username Dixon; Password Dixon51 Install LC4. Run LC4 and choose retrieve from local machine, select strong password audit, and select all reporting styles Page
5 After selecting the default settings, passwords like 77up with one to three leading digits. First attempt to crack password 77up took 17 hours, 25 minutes and 45 seconds. For this run, the default settings are two appended digits at the end and added an additional two digits to the front. By turning off the last two digits and running the test again and cracked the password up77 in 5 minutes and 51 seconds. Then turned on a feature to substitute letter for symbol like e=3, a=@, s=5, 1=! etc, it took 1 hour, 50 minutes, and 32 seconds to crack the password p@55w0rd. Install SAMInside. Run SAMInside. Click on the people icon to import the local users on the machine. Click on the run attack to start the password scan. SAMInside demo version can perform two to eight alpha characters only with a maximum of 50 minutes runtime. The following are the results from SAMInside s Brute Force attack: aa 0 second B3d 1 second lfhh 1 second gurtk 2 seconds dacwed 18 seconds huhaccs 36 minutes luftyput ran past the 50 minutes limit Results and Student Feedback Students found that not all words of the same type are going to be found at the same time. In User Info attack, all words will be broken almost instantaneously. With Dictionary attack, some words will be found faster than others due to the order in which words are placed in the dictionary file. With a hybrid or brute attack words of the same type and length may also take different quantities of time for the same reason. For instance first run to find 77up in LC4 test attack took over 17 hours and was more than 95% scan process was complete before finding the password. At the same time P@55w0rd search took almost two hours and finished only 20% scan process. Overall students found the times for the longer experiments hardly have enough data to show how long a typical word of that length and type would take to crack. When using LC4 s dictionary attack, it did not find even simple two letter words. This could have been due to the limited use of very small dictionary and no Brute Force attack with the LC4 demo version. On the other hand two letter words were found very easily by the SAMInside Brute Force attack. In general students were able to break almost all the chosen passwords. Student also learned the best practices for making a password. They are as follows: for Windows use 7 to 14 character don t use small words even if they are separated by numbers or symbols select the letters in unpronounceable combinations include three or more numbers, not attaching all at the beginning or end Page
6 In conclusion, students were able to perform experiments with various password lengths, characters and complexity. They were able to conduct different types of attacks used in the experiments and were able to understand how and why they work. Various methods were used to formally assess the effectiveness of this project including the instructor s assessment of laboratory work and classroom presentation. Based on the student s feedback, the overall response from students regarding whether the class project met their expectations was very positive and the project integrated into the course was positive. 3. Passwords Shielding Techniques The above experiments enabled students to understand that password cracking can be easily done if the system is not properly protected. Passwords can be cracked the easiest if the machine is not part of a domain and if there is physical access to the machine. By installing high quality security software on computer systems hackers may not be able to install the software they require to hack a password. Disabling access to drives to boot from other than ones needed may stop a hacker from cracking a password. Installing a hardware device can also help by not allowing machines to access the network that do not meet the company s security policies. Also having a unified threat management system at the gateway can help to keep outsiders that don t belong outside. Also informing and educating the employees on how to protect them and how important it is to keep passwords safe can help. Using a VPN solution can help remote users to stay secure. Many programs can be used to gain the local administrator password of the machine with only physical access to it. To prevent a potential hacker from getting this password, a network administrator can do a few things. First disable booting from the CD and floppy drives as well as USB and network ports. Secure the bios with a strong password and use a zip-tie or lock to secure the machine closed. This will prevent potential hackers from gaining local administrative rights. To help safe guard domain accounts and administrator can place good password policy. Using group polices manager for active directory an administrator can place polices for passwords. Polices can include password length, complexity and length of time it s good for. Doing this allows the user to still pick their own password and adhering corporate polices. One of the hardest tasks for administrators is securing remote access. Remote Desktop protocol is commonly used to remotely access the corporate network. The flaw with this is that it sends all data as plain text including passwords. To stop this system administrator can use a VPN solution. An administrator can use an IPsec or SSL client to have the remote user VPN in before using remote desktop. The IPsec Client is great for logging into a machine using remote desktop. The SSL is better suited for remote desktop web connection and web logins. Most companies have an appliance that can handle VPNs and would require very little cost to make them operational. Page
7 The password is only protected if the network is protected. Using a good security software can help to protect passwords by detecting malicious software and removing it as well as stopping suspicious network activity. Using a network access server can prevent unwanted guests from gaining access to the network. Using a network access server should be used for both wired and wireless access. A secure gateway security appliance can help to block ports and activity coming in that may harm the network. Using a smart card or biometric scanner as a second form of authentication can greatly improve security. 4. Conclusion There are many ways for someone to get a password they shouldn t have. By following several basic steps and guidelines you can create a well designed password security police that can help to safeguard your data. This policy along with proper education to the user can help safeguard passwords therefore protecting data. In conclusion, this experiment forced students to learn the following password shielding techniques Encrypt the password files Windows does this automatically 3 rd party software tools to protect passwords Disable booting to Disk drives other than hard drive and removable devices Use SSL or IPsec VPN software to stop passwords from being sniffed Use hard password polices and change often Proper setting permissions of each user Strong perimeter security and Training Add smart card or biometrics as a second form of authentication 5. Bibiliography [1] R. Morris and K. Thompson, Password Security: A Case History, Communications of the ACM, Volume 22, Number 11, November 1979, pp [2] N. Provos and D. Mazières, A Future-Adaptable Password Scheme - The OpenBSD Project, Proceeding of the 1999 USENIX Annual Technical Conference, June 6-11, 1999, Monterey, CA [3] I. Dubrawsky, M. Cross, J. Faircloth, Security+ Study Guide, Elsevier Science & Technology Books, 2007 [4] Top 10 Password Crackers Released by insecure.org, Retrieved on January 30, 2009 [5] Ophcrack - Windows password cracker, ophcrack.sourceforge.net [6] L0phtCrack (LC4) Tools, [7] CNET.com free download from Page
Cain & Abel v 2.5. Password Cracking Via ARP Cache Poisoning Attacks. v.1. Page 1 of 15
Cain & Abel v 2.5 Password Cracking Via ARP Cache Poisoning Attacks v.1 2004 Page 1 of 15 Objective: At the end of this lab students will be able to use the password auditing and ARP Poison Routing (APR)
Security Considerations White Paper for Cisco Smart Storage 1
Security Considerations White Paper for Cisco Smart Storage An open network is like a bank s vault with windows Bill Thomson Network-Attached Storage (NAS) is a relatively simple and inexpensive way to
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
CIS 8630. Business Computer Forensics and Incident Response. Lab Protocol 06: Password Cracking with Cain and Abel
CIS 8630 Business Computer Forensics and Incident Response Lab Protocol 06: Password Cracking with Cain and Abel Purpose: Ensure every student gains first-hand experience with password cracking tools.
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Know the Risks. Protect Yourself. Protect Your Business.
Protect while you connect. Know the Risks. Protect Yourself. Protect Your Business. GETCYBERSAFE TIPS FOR S MALL AND MEDIUM BUSINESSES If you re like most small or medium businesses in Canada, the Internet
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
Rainbow Cracking: Do you need to fear the Rainbow? Philippe Oechslin, Objectif Sécurité. OS Objectif Sécurité SA, Gland, www.objectif-securite.
ainbow Cracking: Do you need to fear the ainbow? Philippe Oechslin, Objectif Sécurité 1 On the menu 1. ainbow tables explained 2. Who is vulnerable 3. Tools and history 4. What you should do about it 2
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
SCRIPT: Security Training
SCRIPT: Security Training Slide Name Introduction Overview 1 Overview 2 Overview 3 Text Welcome to the MN WIC Program Security Training Module for all MN WIC Program staff provided by the MN Department
TECHNICAL WHITE PAPER. Symantec pcanywhere Security Recommendations
TECHNICAL WHITE PAPER Symantec pcanywhere Security Recommendations Technical White Paper Symantec pcanywhere Security Recommendations Introduction... 3 pcanywhere Configuration Recommendations... 4 General
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. www.uscyberpatriot.
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION
Ethical Hacking Course Layout
Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
File Management and File Storage
File Management and File Storage http://training.usask.ca Information Technology Services Division Table of Contents File Management at the University of Saskatchewan...3 Introduction...3 Creating Files
Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes
Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes Compass Security AG, Daniel Stirnimann Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel +41 55-214 41 60 Fax +41
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
Law College Computer and Technology Information
Law College Computer and Technology Information Account Creation All law students, faculty and staff must have a University of Toledo authentication domain (UTAD) computer account. This account will allow
Advanced Diploma In Hardware, Networking & Server Configuration
Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking
NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO
TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,
Secure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to
Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication
Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication This document describes how to configure WPA-Enterprise and WPA2 security protocols with RADIUS authentication for Check Point Embedded
SPICE EduGuide EG0015 Security of Administrative Accounts
This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and
Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.
Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop. Our aim is to address the students apprehensions and anxieties regarding their career prospects in Ethical
Hang Seng HSBCnet Security. May 2016
Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
SSL VPN Portal Options
1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the SSL VPN Wizard to configure SSL VPN portals on the ProSecure Unified Threat Management (UTM) Appliance. The Secure Sockets
Internet Filtering Appliance. User s Guide VERSION 1.2
Internet Filtering Appliance User s Guide VERSION 1.2 User s Guide VERSION 1.2 InternetSafety.com, Inc 3979 South Main Street Suite 230 Acworth, GA 30101 Phone 678 384 5300 Fax 678 384 5299 1 Table of
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21
Contents 1 Networking Basics............................................... 1 Selecting a network connection........................................ 2 Wired Ethernet network...........................................
Penetration Test JSPLC. Contact: James, APS (CCNA, CEH) contactep105t@secure- mail.biz
Contact: James, APS (CCNA, CEH) contactep105t@secure- mail.biz Ok, so this isn t the typical way that a pen test report would start, but we might as well get straight in to it. I am a customer of Sainsbury
How To Use Quantum Rbs Inc. Small Business Backup
Small Business Backup & Recovery (File Servers, Peer-to-Peer, Laptops, Desktops) Smart Features: Continuous Backup Anywhere Access to Backed Up Data Simple Rate Plan Secure Bank Grade Encryption Open Files
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Overview of PC Security Since computer security has become increasingly important, almost all of the focus has been on securing
Securing end-user mobile devices in the enterprise
IBM Global Technology Services Thought Leadership White Paper January 2012 Securing end-user mobile devices in the enterprise Develop an enforceable mobile security policy and practices for safer corporate
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Five Steps to Improve Internal Network Security. Chattanooga ISSA
Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Remote Administration
Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
SPAMfighter Mail Gateway
SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4
Windows XP Virtual Private Network Connection Setup Instructions
Windows XP Virtual Private Network Connection Setup Instructions Find your My Network Places icon on your desktop or in your control panel under Network and Internet Connections By default, this is NOT
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
How to configure Mac OS X Server
How to configure Mac OS X Server By Rob Buckley In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X. See photo story here
Network Security: Introduction
Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has
Endpoint Security VPN for Mac
Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion
Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,
Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0
Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction
RemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
10 WIRELESS, REMOTE, AND WIDE AREA NETWORKING
10 WIRELESS, REMOTE, AND WIDE AREA NETWORKING PROJECTS Project 10.1 Project 10.2 Project 10.3 Project 10.4 Project 10.5 Project 10.6 Understanding Key Concepts Understanding Wireless Technologies Setting
Endpoint Security VPN for Windows 32-bit/64-bit
Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
Quick Installation Guide
Wired/Wireless IP Camera Quick Installation Guide Model: AJ-C2WA-C118 0 Step 1: Hardware Installation 1. Install the Wi-Fi antenna. 2. Plug the power adaptor into camera. 3. Plug the network cable into
Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.
USC Marshall School of Business Academic Information Services Configuring Outlook 2010 RPC Over HTTP Protocol For Windows 7 Home Computers or Wireless Laptops The steps in this document cover how to configure
AirStation VPN Setup Guide WZR-RS-G54
AirStation VPN Setup Guide WZR-RS-G54 WZR-RS-G54 Introduction The WZR-RS-G54 s VPN services allows users to securely access their home or office network from anywhere in the world. All services available
technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
Lab - Dual Boot - Vista & Windows XP
Lab - Dual Boot - Vista & Windows XP Brought to you by RMRoberts.com After completing this lab activity, you will be able to: Install and configure a dual boot Windows XP and Vista operating systems. Explain
Procedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
IBM i Version 7.2. Security Service Tools
IBM i Version 7.2 Security Service Tools IBM i Version 7.2 Security Service Tools Note Before using this information and the product it supports, read the information in Notices on page 37. This edition
Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway
SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document
Own your LAN with Arp Poison Routing
Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
SECURING YOUR REMOTE DESKTOP CONNECTION
White Paper SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY SECURE REMOTE ACCESS 2015 SecurityMetrics SECURING YOUR REMOTE DESKTOP CONNECTION 1 SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY
Using GhostPorts Two-Factor Authentication
Using GhostPorts Two-Factor Authentication With CloudPassage Halo GhostPorts is a powerful two-factor authentication feature available with the Halo NetSec and Halo Professional subscription plans. GhostPorts
imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000
English imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000 Version 1.0.1 731-01873A-EN Contents Overview... 1 Network... 2 Network Environments...2
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Zero Configuration VPN Clients for Mobile Users
Zero Configuration VPN Clients for Mobile Users There are a lot of things that I love in life. In technology though, all the things that I love can be summed up into four main categories. Number one, I
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
Chapter 2 Introduction
Chapter 2 Introduction This chapter describes the features of the NETGEAR 54 Mbps Wireless ADSL Modem Router Model DG834G. The Wireless ADSL Modem Router is a combination of a built-in ADSL modem, ADSL
Working Practices for Protecting Electronic Information
Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
City of Jacksonville 1 of 6 Start Here >> http://remote.coj.net
Citrix Remote Access allows employees to access all parts of the city s computer network from any PC with internet connectivity. Simply type the URL for Remote Access on any internet browser anywhere,
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
Boston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved.
Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Table of Contents Getting Started... 4 New Features... 4 System Requirements... 4 Configuring Microsoft Internet Explorer... 4 Configuring
Activity 1: Scanning with Windows Defender
Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1 4. Choose Scan selected drives and folders
