Cisco Live / DEFCON / RSA / (ISC)2

Total Page:16

File Type:pdf, Size:1020Kb

Cisco Live / DEFCON / RSA / (ISC)2 #CLUS Penetration Testing For Network Engineers Know Yourself and Enemy, Need Not Fear 100 Battles Joseph Muniz – Architect Americas BRKSEC-2460 #CLUS Cisco Webex Teams Questions? Use Cisco Webex Teams (formerly Cisco Spark) to chat with the speaker after the session How 1 Find this session in the Cisco Events App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space Webex Teams will be moderated cs.co/ciscolivebot#BRKSEC-2460 by the speaker until June 18, 2018. #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 WHY DO WEFAIL? #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Behind the Headlines #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 More than Computer and Phones 500B In 2030 50B In 2020 15B Devices Today #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 More than Computer and Phones 500B In 2030 50B In 2020 15B Devices Today #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 More than Computer and Phones 500B In 2030 50B In 2020 15B Devices Today #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 IoT Challenges Patch Delays Limited Security Development Rogue Devices #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 Threats Continue SamSam Nyetya #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 13 Any Many Get It Wrong #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 Any Many Get It Wrong #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 15 Any Many Get It Wrong #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 Any Many Get It Wrong #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 17 Any Many Get It Wrong #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 18 Option 1: Hope Others Fix It #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 19 Option 2: Validate What’s Going On #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 20 Agenda • Security Language Defined • Penetration Testing Lab • Testing Concepts • Attacking Websites • Attacking Networks • Attacking People • Attacking Mobile Devices • Attacking IoT • Reporting and Next Steps • Conclusion #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 21 Yeay For Giveaways! #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 23 #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 24 Download The CTR Comic https://www.dropbox.com/s/43qfd9f7p8mk8fm/CTR20- Comic.pdf?dl=0 #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 25 Joseph Muniz Technical Security Architect Security Architect – Americas Sales Organization Security Researcher –www.thesecurityblogger.com Speaker: Cisco Live / DEFCON / RSA / (ISC)2 Avid Futbal (Soccer for USA people) Player and Musician Twitter @SecureBlogger #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 26 Risk Management Cyberattacks Broken Down • Common Language for Security Professionals • Exploit takes advantage of vulnerability. • Exploits are not malware, malware is malicious software. • Vulnerabilities can be exploited. • A dropper or stage 1 payload comes down to the victim. • A RAT is a Remote Access Toolkit/Trojan. Takes advantage of To deliver Downloading Objective Malware Goal RATs Exploit vulnerability Dropper/ Rootkit Payload #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 28 Cyberattacks Broken Down • Common Language for Security Professionals • Exploit takes advantage of vulnerability. • Exploits are not malware, malware is malicious software. • Vulnerabilities can be exploited. • A dropper or stage 1 payload comes down to the victim. • A RAT is a Remote Access Toolkit/Trojan. Takes advantage of To deliver Downloading Objective Malware Goal RATs Exploit vulnerability Dropper/ Rootkit Payload #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 29 Cyberattacks Broken Down • Common Language for Security Professionals • Exploit takes advantage of vulnerability. • Exploits are not malware, malware is malicious software. • Vulnerabilities can be exploited. • A dropper or stage 1 payload comes down to the victim. • A RAT is a Remote Access Toolkit/Trojan. Takes advantage of To deliver Downloading Objective Malware Goal RATs Exploit vulnerability Dropper/ Rootkit Payload #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 30 Cyberattacks Broken Down • Common Language for Security Professionals • Exploit takes advantage of vulnerability. • Exploits are not malware, malware is malicious software. • Vulnerabilities can be exploited. • A dropper or stage 1 payload comes down to the victim. • A RAT is a Remote Access Toolkit/Trojan. Takes advantage of To deliver Downloading Objective Malware Goal RATs Exploit vulnerability Dropper/ Rootkit Payload #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 31 Not a Penetration Test • Risk Management – Dealing with any type of risk • Vulnerability Management – Dealing with vulnerabilities • Incident Response – Responding to attacks • Audit – Checking for compliance • Digital Forensics – Investigating breaches / legal needs • Hacking – Unlocking features / creating new capabilities #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 32 Audit – Specific thing like compliance Assessment – Automated tools looking for vulnerabilities Pentest – Testing vulnerabilities using real exploitation #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 33 Compliance • Legal or Business • Should be minimal security • SOC enforces and reports • Customized dashboards can help! AIM for going beyond compliance #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 34 Why First Perform a Vulnerability Assessment Before Pentest? #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 35 Assessment vs Penetration Test . Assessment – Using automated systems to identify potential vulnerabilities . Penetration Test – Executing attacks against identified vulnerabilities Assessment is good to see your weaknesses Penetration Testing is good if you know you are secure #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 36 Common Vulnerabilities and Exposures (CVE) Vulnerability Type: Apache vulnerability Threat Description: Three vulnerabilities in the Apache Struts 2 package Existing Controls: Firewalled and monitored by IPS Probability: Unlikely (not web facing) Impact: Critical http://cve.mitre.org/about/faqs.html #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 37 Vulnerability Assessment Results Challenges • May not be real • Hard to execute • Not accessible • Critical or not? • Specific requirements #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 38 How to Prioritize Risk - COBIT #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 39 Vulnerability Management Current State #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 40 Security is a Journey, Not a destination #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 41 SANS - Vulnerability Management • NAC and Profiling can help with Asset Inventory • Triggers • CVE Identifier may trigger event • Assessment tools • Audits #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 42 Risk Management Best Practice Summary • Automate Network Access • Continuously Assess for vulnerabilities • Develop Risk Rating Strategy • Automate Enforcement (if possible) • Enforce Posture Upon Connection • Enforce Patch Management • Subscribe and Follow Researchers • Don’t Trust Everything You Hear #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 43 Penetration Testing Penetration Testing Starting Points White Box Grey Box Black Box • Know target details • Some details • No details • Topology given • Some topology • Unknown topology • Informed parties • Limited awareness • No awareness • Limited attacks • Many attacks • Any attack Very specific work Hybrid work Attack Anyway Possible #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 45 Penetration Testing Services • Internal teams typically perform White Box • Grey Box is typically the best value • Black Box can give interesting results and most realistic • Reconnaissance is typically the most costly service Work must be properly authorized!
Recommended publications
  • Analysis of Password Cracking Methods & Applications
    The University of Akron IdeaExchange@UAkron The Dr. Gary B. and Pamela S. Williams Honors Honors Research Projects College Spring 2015 Analysis of Password Cracking Methods & Applications John A. Chester The University Of Akron, [email protected] Please take a moment to share how this work helps you through this survey. Your feedback will be important as we plan further development of our repository. Follow this and additional works at: http://ideaexchange.uakron.edu/honors_research_projects Part of the Information Security Commons Recommended Citation Chester, John A., "Analysis of Password Cracking Methods & Applications" (2015). Honors Research Projects. 7. http://ideaexchange.uakron.edu/honors_research_projects/7 This Honors Research Project is brought to you for free and open access by The Dr. Gary B. and Pamela S. Williams Honors College at IdeaExchange@UAkron, the institutional repository of The nivU ersity of Akron in Akron, Ohio, USA. It has been accepted for inclusion in Honors Research Projects by an authorized administrator of IdeaExchange@UAkron. For more information, please contact [email protected], [email protected]. Analysis of Password Cracking Methods & Applications John A. Chester The University of Akron Abstract -- This project examines the nature of password cracking and modern applications. Several applications for different platforms are studied. Different methods of cracking are explained, including dictionary attack, brute force, and rainbow tables. Password cracking across different mediums is examined. Hashing and how it affects password cracking is discussed. An implementation of two hash-based password cracking algorithms is developed, along with experimental results of their efficiency. I. Introduction Password cracking is the process of either guessing or recovering a password from stored locations or from a data transmission system [1].
    [Show full text]
  • New Version of L0phtcrack Makes Cracking Windows Passwords Easier Than Ever  Register
    3/1/2017 New version of L0phtCrack makes cracking Windows passwords easier than ever Register The Cybersecurity source by Rene Millman September 01, 2016 New version of L0phtCrack makes cracking Windows passwords easier than ever This article originally appeared on ­ SC Magazine UK. Nearly 20 years after the first version and the first update in six years, L0phtCrack has been upgraded to version 7 and claims a speed bump of up to 500 times on the previous version. According to L0pht Holdings, the firm behind the tool, it has been revamped with a new cracking engine which takes advantage of multi­core CPUs and multi­core GPUs. A 4­core CPU running a brute force audit with L0phtCrack 7 is now five times faster than L0phtCrack 6. It added that users with a GPU such as the AMD Radeon Pro Duo the increase is 500 times. The release of the original L0phtCrack was 19 years ago and its password cracking capability forced Microsoft to make improvements to the way Windows stored password hashes. Microsoft eventually deprecated the weak LANMAN password hash and switched to only the stronger NTLM password hash it still uses today. The developers claim that Windows passwords are easier to crack today than they were 18 years ago. “On a circa­1998 computer with a Pentium II 400 MHz CPU, the original L0phtCrack could crack a Windows NT, 8 character long alphanumeric password in 24 hours. On a 2016 gaming machine, at less hardware cost, L0phtCrack 7 can crack the same passwords stored on the latest Windows 10 in 2 hours,” said the firm in a statement.
    [Show full text]
  • Password Attacks and Generation Strategies
    PASSWORD ATTACKS AND GENERATION STRATEGIES Predrag Tasevski Tartu University, Faculty of Mathematics and Computer Sciences, major: Master of Science in Cyber Security May 21, 2011 Table of contents Introduction Methods Ad-hoc models Brute force Rainbow tables Examples and tools Comparison of input dictionary list Test Conclusion INTRODUCTION Password is a secret word or string of characters that is used for authentication in order to prove identity or gain access to a resource[Gill(1997)]. I Usage of password cracking tools I Methods and approaches guessing the passwords I Examples of leaks and generating password dictionaries I Comparison of already cracked passwords from available password dictionaries and I Test METHODS Password cracking is a method of guessing the attack. Types of password cracking methods[Vines(2007)]: I Dictionary I Hybrid I Brute force Ad-hoc models Dictionary attacks - colander rules Example Capitalization the rst letter, adding three digits to the end, changing the letter `a' to `@' etc. Hybrid it adds simple numbers or symbols to the password attempt. Brute force Brute force are fraction of the total words that are made by users creating their passwords. Brute force attacks methods: I Pure brute force [Group(2010)] I Letter frequency analysis attack [Stitson(2003)] I Markov models [Shmatikov Arvind(2005)] I Targeted brute force attacks [WEIR(2010b)] Rainbow tables (1) Rainbow tables are using the reduction functions to create multiple parallel chains within a single "rainbow" table. I Increases the probability of a correct crack for a given table size, the use of multiple reduction functions also greatly increases the speed of look-ups [JeXChen(2011)].
    [Show full text]
  • Rainbow Tables & Rainbowcrack Introduction
    Learn Security Online, Inc. © https://www.learnsecurityonline.com/ Rainbow Tables & RainbowCrack Introduction Rainbow tables reduce the difficulty in brute force cracking a single password by creating a large pre-generated data set of hashes from nearly every possible password. Rainbow Tables and RainbowCrack come from the work and subsequent paper by Philippe Oechslin.1 The method, known as the Faster Time-Memory Trade-Off Technique, is based on research by Martin Hellman & Ronald Rivest done in the early 1980’s on the performance trade-offs between processing time and the memory needed for cryptanalysis. In his paper published in 2003, Oechslin refined the techniques and showed that the attack could reduce the time to attack 99.9%of Microsoft's LAN Manager passwords (alpha characters only) to 13.6 seconds from 101 seconds. Further algorithm refinements also reduced the number of false positives produced by the system. The main benefit of Rainbow Tables is that while the actual creation of the rainbow tables takes much more time than cracking a single hash, after they are generated you can use the tables over and over again. Additionally, once you have generated the Rainbow Tables, RainbowCrack is faster than brute force attacks and needs less memory than full dictionary attacks. Rainbow Tables are popular with a particularly weak password algorithm known as Microsoft LM hash. LM stands for LAN Manager, this password algorithm was used in earlier days of Windows and still lives on only for compatibility reasons. By default Windows XP or even Windows Server 2003 keeps the LM hash of your passwords in addition to a more secure hash (NTLM or NTLMv2).
    [Show full text]
  • Secunet Stand and Deliver Essential Secutity Testing Tools Nils Magnus
    secunet Stand and deliver Essential Secutity Testing Tools Nils Magnus FIRST Technical Colloquium 2003 Uppsala, Sweden, February 10 - 11, 2003 secunet Security Networks AG The Trust Company FIRST Technical Colloquium 2003, Uppsala, Sweden Stand and Deliver: Essential Security Testing Tools Nils Magnus secunet Overview and Motivation Incident handling is also Incident prevention Assessing your constituency‘s security status may be helpful Original motivation: Clients bugging me about „number of tools“ Quite a lot security testing can be done with plain Unix tools There are other „schools“: Cisco/netflow, Windows/scanners Part 1: Introduction Part 2: Top 10 attacking tools (Part 3: Defending against most serious threats) Part 4: Discussion about your favourite tools FIRST Technical Colloquium 2003, Uppsala, Sweden Stand and Deliver: Essential Security Testing Tools Nils Magnus secunet Hypothesis Imagine you are going to Desert Island and you are allowed only 10 penetration testing tools My hypothesis: That´s all you need Presentation of my favorite TOP 10 tools What they do, how they work, where to get them, what they obsolete ... Discussion about your own favourites FIRST Technical Colloquium 2003, Uppsala, Sweden Stand and Deliver: Essential Security Testing Tools Nils Magnus secunet Tool 1: nmap The network mapper and scanner, OS detection written by Fyodor latest version: 2.54 beta 33 as of 28/04/2002 Homepage: http://www.insecure.org/nmap/ Typical use: # nmap --vv --sTsT --p80,139p80,139 --P0P0 \ --oo scanscan...txttxt --mm scanscan...datdat 192.168.13.192/29 obsoletes: cheops, ftp-scanner, bind-scanner, webscanner, (sing), ... FIRST Technical Colloquium 2003, Uppsala, Sweden Stand and Deliver: Essential Security Testing Tools Nils Magnus secunet nmap FIRST Technical Colloquium 2003, Uppsala, Sweden Stand and Deliver: Essential Security Testing Tools Nils Magnus secunet Tool 2: dig (or host) Tells you all about DNS entries.
    [Show full text]
  • Password Cracking and Sniffing
    Password Cracking and Sniffing • Agenda ! Storing Passwords on the system ! Password Cracking on Windows and Linux ! Defenses against Password cracking ! Sniffing ! Defenses against Sniffing ECE 4883 - Internetwork Security 1 Cracking Passwords • Passwords that can be guessed easily are a problem • Lots of tools available to figure out passwords • L0phtcrack windows password cracker • “John the Ripper” Unix password cracker • Default passwords remaining on a system are a typical vulnerability ECE 4883 - Internetwork Security 2 Password storage • Password files have passwords stored in a hashed or encrypted form • Hash algorithm example is message digest 4 (MD4) • Encrypted algorithm example is Data Encryption Standard (DES) • When you use your password, it is hashed or encrypted and then compared to the stored value • Crackers use a downloaded local copy of password file on their own machine ECE 4883 - Internetwork Security 3 Storing Passwords • Systems have a file with all hashed/encrypted passwords ! Windows – SAM (Security Accounts Manager) database ! UNIX - /etc/passwd or /etc/shadow • Access to these files can make it easy for a hacker to break in ECE 4883 - Internetwork Security 4 Windows Passwords • Security Accounts Manager (SAM) has two versions for each password • LanMan (LM) password version for backward compatibility with windows workgroups • NT Hash – cryptographic hash for windows NT/2000 (Uses MD4) • SAM file is in \WINNT\system32\config\ directory which is a binary file that is hard to read • Back up copy stored in \WINNT\repair
    [Show full text]
  • Supercharged John the Ripper Techniques
    Supercharged John the Ripper Techniques Austin OWASP Spring, 2011 Rick Redman - KoreLogic Introduction Who am I: Rick Redman – Senior Security Consultant – Penetration Tester Bio: During my 11 years as a security practitioner, I have delivered numerous application and network penetration tests for a wide range of Fortune 500 and government clients. I serve as KoreLogic's subject matter expert in advanced password cracking systems. I present at a variety of security forums such as ISSA Chapters and AHA (Austin Hackers Anonymous) and provides technical security training on topics such as web application security. I has served as a member of a penetration testing tiger team supporting Sandia National Laboratories. I am a graduate of Purdue University with a degree in Computer Science in the CERIAS/COAST program taught by Gene Spafford. 2 Who is KoreLogic Who is KoreLogic: . An expert-based information security and IT risk management firm. Serve Fortune 500 and Government clients. 500+ security engagements delivered. Invited speakers: OWASP, Shmoocon, CEIC, SIM, ISSA, DoD, Universities . Winner: File Carving Challenge, Digital Forensic Research Workshop. Creator: “Crack Me If You Can” password cracking contest at DEFCON . Privately held and founder-operated allow us to practice a quality- and client-first approach. 3 Today’s Focus Today’s goal: Show default password cracking methods/tools. Pros/Cons of each. Show patterns used by users in environments that enforce password complexity (patterns observed from over 3.1 million hashes cracked by KoreLogic). Improve the methods/rules used to crack passwords, in order to crack large amounts of complex passwords. Give advice on how to create complex passwords that aren’t based on known patterns.
    [Show full text]
  • Is Ophcrack Safe
    Is ophcrack safe click here to download Ophcrack is a free open source (GPL licensed) program that cracks Windows log-in passwords by using LM hashes through rainbow tables. The program includes the ability to import the hashes from a variety of formats, including dumping directly from the SAM files of Windows. On most computers, ophcrack can crack most Operating system​: ​Microsoft Windows​, ​Linux​. Ophcrack is open source software, hosted on Sourceforge. Packages hosted on Sourceforge are considered safe because the source code can be inspected by anyone. This doesn't rule out third parties from adding trojans, or the devolopers passing on a virus if their machine is infected, however. If you get Is it safe to download Ophcrack from SourceForge? A Windows password cracker based on rainbow tables. In reply to: Tried Restarting In Safe Mode? Then . Download a copy of Ophcrack and burn it to disk on a separate computer. Put it in the drive of the newly obtained computer and boot the system. If it's a Dell, press F12 as soon as you power on to select an alternate boot device, on the list, select the CD Failed Ophcrack Boot, Now System Won't Boot. There are few tasks users fail easier than remembering their logon password. Unfortunately Windows is relatively secure in keeping it safe. Fortunately you. Ophcrack (Figure B) is one of the most popular password recovery tools. It's free (open source as well), cross platform, and very reliable. Ophcrack uses a solid implementation of rainbow tables that just happens to have been done by those who created the method.
    [Show full text]
  • Hack Instagram Using John the Ripper Hack Instagram Using John the Ripper
    hack instagram using john the ripper Hack instagram using john the ripper. - The Best Working Methods of 2020. On this page you will find the other methods except InstaRipper which are used to hack Instagram accounts. Of course, InstaRipper is not the only way to make access inside an Instagram profile successfully. And today we are going to explain the each of working methods in detailed step by step tutorial. The methods are gathered from leading & most reliable hacking related blogs and forums. All are checked and tested before we decided to add them to the list. So, make yourself comfortable and focused for reading because here we go! Method #1 - Using a Keylogger (The Best Method) Since Instagram is visited by users in 99% cases from smartphones & tablets (comparing to desktop computers), we are going to talk about a mobile keylogger here. What is a keylogger? It's an application made to monitor keystrokes on a certain device and store it inside a logs documents or automatically send it to a server or email address of the keylogger's administrator. This means that if you install a keylogger app on someone’s mobile phone, you can spy on everything they typed on their keyboard when they are texting with someone from any messaging app (Facebook, Instagram, SMS, WhatsApp, any other!). Everything what they typed anywhere inside their cellphone from the moment a keylogger is installed on their device will be sent to your keylogger's account or your email address. But the THING with a keylogger is, How to Install it on someone’s phone without being noticed? After a keylogger is installed and running on device, it can't be noticed because its process is running in a background of operating system, and it will auto-run itself every time a device is turned on.
    [Show full text]
  • Attack, a Hacker Attacks the Availability Elements of Systems and Networks
    CH1 Security consists of four basic elements • Confidentiality • Authenticity • Integrity • Availability Denial-of-service (DoS) attack, a hacker attacks the availability elements of systems and networks. Confidentiality attack (Information theft), stealing passwords or other data as it travels in clear text across trusted networks. Bit-flipping attacks are considered integrity attacks because the data may have been tampered with in transit or at rest on computer systems; therefore, system administrators are unable to verify the data is as the sender intended it. A bit-flipping attack is an attack on a cryptographic cipher: the attacker changes the cipher text in such a way as to result in a predictable change of the plain text, although the attacker doesn’t learn the plain text itself. This type of attack isn’t directed against the cipher but against a message or series of messages. MAC address spoofing is an authentication attack because it allows an unauthorized device to connect to the network when Media Access Control (MAC) filtering is in place, such as on a wireless network. Ethical Hacking Terminology Threat An environment or situation that could lead to a potential breach of security. Exploit A piece of software or technology that takes advantage of a bug, glitch, or vulnerability, leading to unauthorized access, privilege escalation, or denial of service on a computer system. Vulnerability The existence of a software flaw, logic design, or implementation error that can lead to an unexpected and undesirable event executing bad or damaging instructions to the system. Target of Evaluation (TOE) A system, program, or network that is the subject of a security analysis or attack.
    [Show full text]
  • Experiments with Computer Password Cracking and Shielding Techniques
    AC 2009-1697: EXPERIMENTS WITH COMPUTER PASSWORD CRACKING AND SHIELDING TECHNIQUES Veeramuthu Rajaravivarma, State University of New York, Farmingdale V. Rajaravivarma is currently with the Electrical and Computer Engineering Technology at SUNY, Farmingdale State College. Previously, he was with Tennessee State University,Morehead State University, North Carolina A&T State University, and Central Connecticut State University. Dr. Rajaravivarma teaches electronics, communication, and computer networks courses to engineering technology students. His research interest areas are in the applications of computer networking and digital signal processing. Cajetan Akujuobi, Prairie View A&M University Dr. Akujuobi is a Professor of Electrical Engineering and the founding Director of the DSP Solutions, Mixed Signal Systems and Broadband Access Technologies Programs and Laboratories at Prairie View A&M University. He is also the founding Director of the Center of Excellence for Communication Systems Technology Research (CECSTR). His research interests include High-Speed (Broadband) Communication Systems, Mixed Signal Systems and DSP Solutions. He is also the Department Head for Engineering Technology at Prairie View A&M University. Page 14.610.1 Page © American Society for Engineering Education, 2009 Experiments with Computer Password Cracking and Shielding Techniques Abstract Internet is dominating almost every aspect of our life. Internet applications are too many in today’s business world. It is hard to imagine any office or home without a computer network. All kinds of money transactions are possible today because of the fast changes in computer technology. As a result, everyone with an online account can buy or sell anything over the Internet in a secured environment. Therefore, it is important to secure the computer with the easy username and an unbreakable password.
    [Show full text]
  • Passwordhacking Med Rainbow Crack Windows Passwords Er Døde
    Denne guide er oprindeligt udgivet på Eksperten.dk PasswordHacking med Rainbow Crack Windows passwords er døde. Selv de bedste passwords kan crackes på få minutter. Rainbow Crack er et spændende projekt der allerede nu rykker ved sikkerheden og stiller nye krav til os som administratorer. Skrevet den 03. Feb 2009 af bufferzone I kategorien Sikkerhed / Kryptering | Rainbow Crack - Speed til hackerne http://www.antsight.com/zsl/rainbowcrack/ Våbenkapløbet døde ikke med den kolde krigs afslutning, og den har aldrig været begrænset til den militære verden. Også i IT verdenen har den kørt løbende gennem årene som et kapløb mellem TI sikkerhedsbranchen og hackerne. Rainbow Crack lyder måske nok som narkotika, men I virkeligheden er det blot endnu kapitel den fortsatte føljeton om kampen mellem password sikkerhed og cracker værktøjerne. Lige nu er de sidste desværre foran. Windows Password - Sådan virker det Når du taster et password ind i din Windowsmaskine første gang, omsættes det automatisk til en såkaldt hashværdi (Endnu en narkotisk reference, der i virkeligheden intet har med narko at gøre. Husk at computerens fædre for størstedelens vedkommende er fra 68 generationen. Det kunne jo forklare en del). En hashværdi er en streng af hexadecimale værdier. http://www.fileformat.info/tool/hash.htm Prøv f.eks. med ordet "eksperten" (uden " selvfølgelig) Original bytes 65:6b:73:70:65:72:74:65:6e (length=9) Adler32 130803d2 CRC32 da4228c4 Haval dffd21694a46c050ec12d494e98cf63e MD2 5b57cdb3a506bea2b55ff54cf15a37d7 MD4 d3162e7d9af7ac12c36676bc74abe7c1 MD5 2b12d915e46ec434d5cf1a40eadb643a Ripe MD128 5196eca984f67370832824afb18e6ea4 Ripe MD160 70ad85695a095d0f87e9eb3281bbb06897e745f9 SHA-1 7cfa3926bf32946932e8a9eeac983a40a5167b19 Ordene til højre i boksen er forskellige algoritmer, strengene til venstre er hash værdierne Den genererede hashværdi gemmes af Windows i SAM databasen og det password du har indtastet dumpes.
    [Show full text]