A Survey of Possible Attacks on Text & Graphical Password Authentication

Total Page:16

File Type:pdf, Size:1020Kb

A Survey of Possible Attacks on Text & Graphical Password Authentication International Journal of Scientific Research in _______________________________ Survey Paper . Computer Science and Engineering Vol.6, Special Issue.1, pp.77-80, January (2018) E-ISSN: 2320-7639 A survey of Possible Attacks on Text & Graphical Password Authentication Techniques Sanjay E. Pate Bhojaraj H. Barhate Department of Computer Science, Department of Computer Science Nanasaheb Y.N.Chavan Arts,Science & Commerce Bhusawal Arts, Science & P.O.Nahata Commerce College, College,Chalisgaon, Dist.Jalgaon Bhusawal Abstract- The process of verifying a user's identity is typically referred to as user authentication. Information Security and Authentication is now a key issue in the world. Gradually end users of Internet improved. General uses of the Internet are searching, e-mail, social networking, e-banking, e-governance, etc. User Authentication is the process of determining whether the user should be authorized to access information or not. Alphanumeric or text passwords are mostly used mechanism for authentication. But these are susceptible to a dictionary, brute force and guessing attacks. Resolution is to use Graphical Password, is more secure, reliable technique for authentication. Graphical passwords allow users to remember pictures/images instead of text which helps them to remember the passwords easily. But these are also vulnerable to the dictionary, brute force and guessing attacks. In this paper, Text-based password and graphical password techniques for Authentication are just discussed, and possible attacks on them are summarized. KEYWORDS: Phishing, bots, OCR, PIN uses who you are? Single, measurable characteristic of an Introduction: individual (e.g., Iris, fingerprint) [15,5]. Passwords are the way used most frequently for Among the three techniques, the knowledge-based technique authenticating computer users, but this method has often is widely used for authentication because it is well known to shown insufficient in preventing unauthorized access to all areas of users and easy to implement. computer resources when used as the only means of Token-based and Biometric based authentications are more authentication. In public and private computer networks secure than knowledge-based authentication but, those including the Internet, authentication is done through the use techniques have their limitations. In the case of Token based of Login IDs (user name) and passwords. User authentication, the token should always be carried for authentication means that allows a device to verify the locating the service, and there is a possibility of missing the identity of someone who connects to a network resource. token or the token being stolen by somebody. To bypass the Natures of Authentications: usage of stolen tokens, an expansive token based There are three basic methods for authentication – authentication uses PIN (Personal Identification Number) in a. Knowledge-based authentication addition to tokens for authentication. Biometric b. Token-based authentication authentication is not but adopted for all applications because c. Biometric-based authentication [7,11,6]. of the expenditure involved in maintaining the special devices. For authentication, Knowledge-based authentication In common, the three techniques can be used for various technique uses something the user knows (e.g., text types of applications based on the security requirements. In passwords, graphical passwords, etc.), Token-based the present situation, every user has to maintain the number authentication technique uses something the user has (e.g., of user accounts either for office work or private work. smart card) and Biometric based authentication technique Biometrics or Tokens can be used for applications with high- security requirements, and knowledge-based authentication can be used for other applications. © 2018, IJSRCSE All Rights Reserved 77 Int. J. Sci. Res. in Computer Science and Engineering Vol.6(1), Jan 2018, E-ISSN: 2320-7639 The traditional method used for knowledge-based password complexity depends on the number and the length authentication is textual passwords. of the strokes in the password. But it is difficult to remember the order of the multiple strokes in random shape passwords. Drawing a password with the mouse is inconvenient. 1. Textual passwords: Cued recall systems are useful in memorability. Cues help A textual password is a conventional method used for user the users to retrieve the passwords from memory without authentication. It remains the most widely used method writing anywhere. The security of passwords in cued recall because it is simple, inexpensive compared to other system depends on the image selected for authentication. techniques and easy to implement [8,2]. Users are likely to Images will be having the limited number of clickable points select short and straightforward passwords to remember for password selection which reduces the password space, easily. It is effortless for the interloper to break these simple and in turn, passwords are vulnerable to password guessing attacks. These are vulnerable to password capturing attacks passwords. Random and lengthy passwords are hard to because entire password or user’s portfolio will be displayed remember. The main problem with the traditional textual for every login which can be observed by the intruders. method is that passwords selected for many applications are Password creation and login times are more compared to either weak and memorable or secure but difficult to recall systems. recognize [13,9]. Some users even use the name of the system as password [12]. The lengthy passwords provide II. Literature Review: more security but, it is difficult to remember several such Security of passwords can be specified in relations of long passwords. It is a tendency that users use the same resistance to various types of attacks. An attack is an attempt password for many accounts to reduce the load on the to deed vulnerabilities in the passwords. memory which makes interloper’s job easy [1,3]. It is easy Attacks can be categorized into password guessing attacks to capture the textual password either by shoulder surfing or and password capturing attacks. Password guessing attacks by malware. So the textual passwords are vulnerable to include brute force, dictionary and (personalized) guessing dictionary, (personalized) guessing and capturing attacks. To attacks. Password capturing attacks include shoulder surfing, address the problems of textual passwords, Graphical hidden camera, social engineering and malware attacks. passwords are introduced. Password guessing attacks has been resisted by having a 2. Graphical Passwords: large password space and strong passwords. Password Graphical passwords can be categorized into three methods capturing attacks can be resisted by introducing recognition based, recall based and cued recall based on the authentication techniques which depend on the secret cognitive load on the user in retrieving the passwords from entered by the user as well as the login interface. Security memory [16, 15, and 6]. may be increased by adding multiple rounds in the Recognition based techniques are useful in memorability; authentication technique at the cost of usability. Though it is users can remember and recognize the passwords desirable to have higher values for security and usability, successfully. The server has to maintain the large number of images or faces and for every round of authentication server due to the tradeoff between them, an optimal solution will be has to prepare the challenge set for every user. Due to the selected depending on the application. limited number of images in the challenge set and few I. Attacks on Text and Graphical password : rounds used for authentication, the password space is less in A. Brute Force Attack: recognition based techniques and turn these are vulnerable to Success of this attack depends on the set of predefined password guessing attacks. The Password capturing attacks values. If it is larger, it will take more time, but there is require multiple logins to get the complete portfolio of the better probability of success.However, GUA proves to be user. The password creation time and login times are more, more resistant to brute force attacks since the attack software compared to recall based techniques. needs to produce all possible mouse motions to imitate passwords especially when trying to recall the graphical Recall based techniques have large password space and are passwords [4]. secure against password guessing attacks. There is no need B.Dictionary Attack : to maintain a large number of images or faces by the server This creative attack uses words found in the dictionary to and no requirement of forming the challenge set. The check if any were used as passwords by the users. Many Password creation and login times are less than the other two users use weak passwords which make it easier for attackers techniques. The recall based techniques are vulnerable to to guess the password using the graphical dictionary attack password capturing attacks because in a single session or by [10]. Because of graphical password method of using mouse only observation the intruder may get the password. The input type recognition, using the dictionary attack on GUA © 2018, IJSRCSE All Rights Reserved 78 Int. J. Sci. Res. in Computer Science and Engineering Vol.6(1), Jan 2018, E-ISSN: 2320-7639 would be a waste of time. Dictionary attacks against D. Shoulder-Surfing Attack recognition and cued-recall graphical password
Recommended publications
  • Automating Security Checks
    Mag. iur. Dr. techn. Michael Sonntag Automating security checks Institute for Information Processing and Microprocessor Technology (FIM) Johannes Kepler University Linz, Austria E-Mail: [email protected] http://www.fim.uni-linz.ac.at/staff/sonntag.htm © Michael Sonntag 2010 Agenda Why automatization? What can be automated? Example: Skipfish How reliable are these tools? Practical examples of searching for vulnerabilities: Information collection with NMap Password cracking (John the Ripper, Ophcrack) Exploit scanning with Nessus Michael Sonntag Automating security checks 2 Why automatization? Ensuring security is not that hard for a single system You know it in detail When something is discovered, it is implemented and tested But: Many sites with many configuration options? Do you know them all? » Are they identical everywhere (versions!)? Do you have time to change everything accordingly? » Or do you depend on automatic updates/roll-out? Are you sure you did not miss one option somewhere? » Testing the same thing several times is tedious Solution: Automatic testing whether a problem exists Professionals write tests You just apply them » No need to know exactly how the attack works! Regular re-testing is possible Ad-hoc & patchy testing Systematic & comprehensive Michael Sonntag Automating security checks 3 Overlap with monitoring Some overlap with system monitoring exists Failures are just a “different kind” of attack Some problems may occur accidentally or intentionally » Example: Blacklisting of mail
    [Show full text]
  • Truecrack Bruteforcing Per Volumi Truecrypt
    Luca Vaccaro http://code.google.com/p/truecrack/ [email protected] User development guide. TrueCrypt © . software application used for on-the-fly encryption (OTFE). TrueCrack . bruteforce password cracker for TrueCrypt © (Copyrigth) volume files, optimazed with Nvidia Cuda technology. This software is Based on TrueCrypt, freely available athttp://www.truecrypt.org/ Master key . Crypt the volume of data. Generated one time in the volume creation phase from random value. Write inside the header section of the volume file. Header key . Crypt the header section of the volume file. Generated from a user password and a random salt (64 bytes). The salt is write in plain text in the first 64 bytes of volume file. Hard disk encryption: . Standard block cipher: XTS . Hash availables: AES, Serpent, Twofish . Default: AES Key derivation function: . Standard algorithm: PBKDF2 . Hash availables: RIPEMD160, SHA-512, Whirpool . Default: RIPEMD160 Master Header Key Key Plain Cipher Volume data data + file header Opening a TrueCrypt volume means to retrieve the Master Key from the Header section In the Header there are some fields (true, crc32) for checking the success of the decipher operation . If the password is right or wrong Header key User password salt Volume Master file key CUDA or Compute Unified Device Architecture is a parallel computing architecture developed by Nvidia. CUDA gives developers access to the virtual instruction set and memory of the parallel computational elements in CUDA GPUs. Each GPU is a collection of multicores. Each core can run mmore cuda «block», and each block can run a numbers of parallel «thread» 1. Level of parallilism : block 2.
    [Show full text]
  • Analysis of Password Cracking Methods & Applications
    The University of Akron IdeaExchange@UAkron The Dr. Gary B. and Pamela S. Williams Honors Honors Research Projects College Spring 2015 Analysis of Password Cracking Methods & Applications John A. Chester The University Of Akron, [email protected] Please take a moment to share how this work helps you through this survey. Your feedback will be important as we plan further development of our repository. Follow this and additional works at: http://ideaexchange.uakron.edu/honors_research_projects Part of the Information Security Commons Recommended Citation Chester, John A., "Analysis of Password Cracking Methods & Applications" (2015). Honors Research Projects. 7. http://ideaexchange.uakron.edu/honors_research_projects/7 This Honors Research Project is brought to you for free and open access by The Dr. Gary B. and Pamela S. Williams Honors College at IdeaExchange@UAkron, the institutional repository of The nivU ersity of Akron in Akron, Ohio, USA. It has been accepted for inclusion in Honors Research Projects by an authorized administrator of IdeaExchange@UAkron. For more information, please contact [email protected], [email protected]. Analysis of Password Cracking Methods & Applications John A. Chester The University of Akron Abstract -- This project examines the nature of password cracking and modern applications. Several applications for different platforms are studied. Different methods of cracking are explained, including dictionary attack, brute force, and rainbow tables. Password cracking across different mediums is examined. Hashing and how it affects password cracking is discussed. An implementation of two hash-based password cracking algorithms is developed, along with experimental results of their efficiency. I. Introduction Password cracking is the process of either guessing or recovering a password from stored locations or from a data transmission system [1].
    [Show full text]
  • Password Cracking Using Cain & Abel
    Password Cracking Using Cain & Abel Learning Objectives: This exercise demonstrates how password could be cracked through ​ various methods, specifically regarding MD5 encrypted passwords. Summary: You will use Cain & Abel for this exercise. ​ Deliverables: Submit a lab report by answering the review questions. In some review ​ questions, you may provide screen captures. Dictionary attack Dictionary attack uses a predetermined list of words from a dictionary to generate possible passwords that may match the MD5 encrypted password. This is one of the easiest and quickest way to obtain any given password. 1. Start Cain & Abel via the Desktop Shortcut ‘Cain’ or Start menu. ​ ​ ​ ​ ​ ​ a. (Start > Programs > Cain > Cain). 2. Choose ‘Yes’ to proceed when a ‘User Account Control’ notification pops up regarding ​ ​ software authorization. 3. Once on, select the ‘Cracker’ tab with the key symbol, then click on MD5 Hashes. The ​ ​ ​ result should look like the image below. 1 Collaborative Virtual Computer Lab (CVCLAB) Penn State Berks 4. As you might have noticed we don’t have any passwords to crack, thus for the next few steps we will create our own MD5 encrypted passwords. First, locate the Hash Calculator among a row of icons near the top. Open it. 5. Next, type into ‘Text to Hash’ the word password. It will generate a list of hashes ​ ​ ​ pertaining to different types of hash algorithms. We will be focusing on MD5 hash so ​ copy it. Then exit calculator by clicking ‘Cancel’ (Fun Fact: Hashes are case sensitive so ​ any slight changes to the text will change the hashes generated, try changing a letter or two and you will see.
    [Show full text]
  • User Authentication and Cryptographic Primitives
    User Authentication and Cryptographic Primitives Brad Karp UCL Computer Science CS GZ03 / M030 16th November 2016 Outline • Authenticating users – Local users: hashed passwords – Remote users: s/key – Unexpected covert channel: the Tenex password- guessing attack • Symmetric-key-cryptography • Public-key cryptography usage model • RSA algorithm for public-key cryptography – Number theory background – Algorithm definition 2 Dictionary Attack on Hashed Password Databases • Suppose hacker obtains copy of password file (until recently, world-readable on UNIX) • Compute H(x) for 50K common words • String compare resulting hashed words against passwords in file • Learn all users’ passwords that are common English words after only 50K computations of H(x)! • Same hashed dictionary works on all password files in world! 3 Salted Password Hashes • Generate a random string of bytes, r • For user password x, store [H(r,x), r] in password file • Result: same password produces different result on every machine – So must see password file before can hash dictionary – …and single hashed dictionary won’t work for multiple hosts • Modern UNIX: password hashes salted; hashed password database readable only by root 4 Salted Password Hashes • Generate a random string of bytes, r Dictionary• For user password attack still x, store possible [H(r,x after), r] in attacker seespassword password file file! Users• Result: should same pick password passwords produces that different aren’t result close to ondictionary every machine words. – So must see password file
    [Show full text]
  • Attack Frameworks and Tools
    Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet Technologies and Mobile Communication WS2014 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische Universität München Overview Introduction Overview of Tools Password Crackers Network Poisoners Network Security Tools Denial of Service Tools Concluding remarks AttackTitel Frameworks and Tools 2 Introduction Network Security – perhaps the most important aspect of communications in todays world How easy it is to attack a target system or network today? . Tools automate most of the work . From fingerprinting your target to attacking . Knowledge requirements decrease day by day AttackTitel Frameworks and Tools 3 Introduction The CIA Triangle Confidentiality Integrity Availability AttackTitel Frameworks and Tools 4 Overview of the Tools Password Crackers • Free • Free • Free • Windows • Various • Linux, Only GUI Platforms OSX and Hashcat Windows Cain and Abel and Cain John the Ripper John AttackTitel Frameworks and Tools 5 Overview of the Tools Network Poisoners • Free • Free • Python • Various ZARP Script Platforms Ettercap AttackTitel Frameworks and Tools 6 Overview of the Tools Network Security Tools • Free • Free • Free • Various (Signup • Python Nmap Platforms Required) Script • Windows Sqlmap Metasploit and Linux AttackTitel Frameworks and Tools 7 Overview of the Tools Denial of Service Tools • Free • Free • Windows • Python LOIC Only GUI HULK Script AttackTitel Frameworks and Tools 8 Password Crackers Attack: Confidentiality Crack passwords or keys Crack various kind of hashes Initially used to crack local system passwords like for Windows and Linux Have extended to include numerous kinds of hashes New versions are faster and use different kind of cracking methods .
    [Show full text]
  • Cryptanalytic Tools
    Cryptanalytic Tools Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider Ruhr-Universität Bochum Module Cryptanalytic Tools Chapter 3: Introduction to Cryptanalysis Chapter 4: Computational Complexity and Parallelism Chapter 5: Secret Parameters and Keys Chapter 6: Tools for Symmetric Cryptanalysis Chapter 7: Tools for Asymmetric Cryptanalysis Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider 1. edition Ruhr-Universität Bochum © 2015 Ruhr-Universität Bochum Universitätsstraße 150 44801 Bochum 1. edition (31. March 2015) Das Werk einschließlich seiner Teile ist urheberrechtlich geschützt. Jede Ver- wendung außerhalb der engen Grenzen des Urheberrechtsgesetzes ist ohne Zustimmung der Verfasser unzulässig und strafbar. Das gilt insbesondere für Vervielfältigungen, Übersetzungen, Mikroverfilmungen und die Einspe- icherung und Verarbeitung in elektronischen Systemen. Um die Lesbarkeit zu vereinfachen, wird auf die zusätzliche Formulierung der weiblichen Form bei Personenbezeichnungen verzichtet. Wir weisen deshalb darauf hin, dass die Verwendung der männlichen Form explizit als geschlechtsunabhängig verstanden werden soll. Das diesem Bericht zugrundeliegende Vorhaben wurde mit Mitteln des Bundesministeriums für Bildung, und Forschung unter dem Förderkennze- ichen 16OH12026 gefördert. Die Verantwortung für den Inhalt dieser Veröf- fentlichung liegt beim Autor. Contents Page3 Contents Introduction to the module books 5 I. Icons and colour codes . 5 Chapter 3 Introduction to Cryptanalysis 7 3.1 Definition of Security . 7 3.1.1 Security of Cryptographic Systems . 7 3.1.2 Categories of Attacks . 8 3.1.3 Categories of Attackers . 9 3.1.4 Secret Key Lengths . 10 3.2 Outline of this Lecture . 11 3.3 Further Reading Materials . 11 Chapter 4 Computational Complexity and Parallelism 13 4.1 Asymptotic Computational Complexity .
    [Show full text]
  • Hash Crack: Password Cracking Manual
    Hash Crack. Copyright © 2017 Netmux LLC All rights reserved. Without limiting the rights under the copyright reserved above, no part of this publication may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise) without prior written permission. ISBN-10: 1975924584 ISBN-13: 978-1975924584 Netmux and the Netmux logo are registered trademarks of Netmux, LLC. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The information in this book is distributed on an “As Is” basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor Netmux LLC, shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it. While every effort has been made to ensure the accuracy and legitimacy of the references, referrals, and links (collectively “Links”) presented in this book/ebook, Netmux is not responsible or liable for broken Links or missing or fallacious information at the Links. Any Links in this book to a specific product, process, website, or service do not constitute or imply an endorsement by Netmux of same, or its producer or provider. The views and opinions contained at any Links do not necessarily express or reflect those of Netmux.
    [Show full text]
  • Chapter 5 Results
    CHAPTER 5 RESULTS 5.1 Results This chapter will discuss the results of the testing and comparison of the password cracking tools used. This chapter can be summarized as follows: • Research Data and Result Analysis (Locally) • Research Data and Result Analysis (Remotely) • Research Data and Result Analysis (Alphabets only) • Research Data and Result Analysis (Alphabets and a special character) 5.2 Research Data and Result Analysis (Locally) In Figure 16, Ophcrack was used to crack the local users' password with different combinations of password, alphabets, alphanumeric, alphanumeric special characters, english and non-english words. In Figure 17, Ophcrack was used to crack the same password, but excluding the 3 password that were not cracked in the previous attempt. In Figure 18, Cain was used to crack the local users' password. 35 36 Figure 16 - Ophcrack cracked 7 of 10 passwords Figure 17 - Ophcrack cracked 7 of 7 passwords 37 Figure 18 - Cain cracked 5 of 10 passwords 5.3 Research Data and Result Analysis (Remotely) First, the author scans the network for active IP address with NMAP (Figure 19). He used the command of "nmap -O 192.168.1.1-254" to scan the network, it would scan each IP address for active computer. The command -O enabled operating system detection. From the result of the scanning, there were few ports in the state of open and the services that were using those ports, 135/TCP, 139/TCP, 445/TCP and 1984/TCP. Another important detail was the OS details; it showed that the computer was running under Microsoft Windows XP Professional SP2 or Windows Server 2003.
    [Show full text]
  • Password Security - When Passwords Are There for the World to See
    Password Security - When Passwords are there for the World to see Eleanore Young Marc Ruef (Editor) Offense Department, scip AG Research Department, scip AG [email protected] [email protected] https://www.scip.ch https://www.scip.ch Keywords: Bitcoin, Exchange, GitHub, Hashcat, Leak, OWASP, Password, Policy, Rapid, Storage 1. Preface password from a hash without having to attempt a reversal of the hashing algorithm. This paper was written in 2017 as part of a research project at scip AG, Switzerland. It was initially published online at Furthermore, if passwords are fed through hashing https://www.scip.ch/en/?labs.20170112 and is available in algorithms as is, two persons who happen to use the same English and German. Providing our clients with innovative password, will also have the same hash value. As a research for the information technology of the future is an countermeasure, developers have started adding random essential part of our company culture. user-specific values (the salt) to the password before calculating the hash. The salt will then be stored alongside 2. Introduction the password hash in the user account database. As such, even if two persons use the same password, their resulting The year 2016 has seen many reveals of successful attacks hash value will be different due to the added salt. on user account databases; the most notable cases being the attacks on Yahoo [1] and Dropbox [2]. Thanks to recent Modern GPU architectures are designed for large scale advances not only in graphics processing hardware (GPUs), parallelism. Currently, a decent consumer-grade graphics but also in password cracking software, it has become card is capable of performing on the order of 1000 dangerously cheap to determine the actual passwords from calculations simultaneously.
    [Show full text]
  • Cisco Live / DEFCON / RSA / (ISC)2
    #CLUS Penetration Testing For Network Engineers Know Yourself and Enemy, Need Not Fear 100 Battles Joseph Muniz – Architect Americas BRKSEC-2460 #CLUS Cisco Webex Teams Questions? Use Cisco Webex Teams (formerly Cisco Spark) to chat with the speaker after the session How 1 Find this session in the Cisco Events App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space Webex Teams will be moderated cs.co/ciscolivebot#BRKSEC-2460 by the speaker until June 18, 2018. #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 WHY DO WEFAIL? #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Behind the Headlines #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 More than Computer and Phones 500B In 2030 50B In 2020 15B Devices Today #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 More than Computer and Phones 500B In 2030 50B In 2020 15B Devices Today #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 More than Computer and Phones 500B In 2030 50B In 2020 15B Devices Today #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 IoT Challenges Patch Delays Limited Security Development Rogue Devices #CLUS BRKSEC-2460 © 2018 Cisco and/or its affiliates.
    [Show full text]
  • New Version of L0phtcrack Makes Cracking Windows Passwords Easier Than Ever  Register
    3/1/2017 New version of L0phtCrack makes cracking Windows passwords easier than ever Register The Cybersecurity source by Rene Millman September 01, 2016 New version of L0phtCrack makes cracking Windows passwords easier than ever This article originally appeared on ­ SC Magazine UK. Nearly 20 years after the first version and the first update in six years, L0phtCrack has been upgraded to version 7 and claims a speed bump of up to 500 times on the previous version. According to L0pht Holdings, the firm behind the tool, it has been revamped with a new cracking engine which takes advantage of multi­core CPUs and multi­core GPUs. A 4­core CPU running a brute force audit with L0phtCrack 7 is now five times faster than L0phtCrack 6. It added that users with a GPU such as the AMD Radeon Pro Duo the increase is 500 times. The release of the original L0phtCrack was 19 years ago and its password cracking capability forced Microsoft to make improvements to the way Windows stored password hashes. Microsoft eventually deprecated the weak LANMAN password hash and switched to only the stronger NTLM password hash it still uses today. The developers claim that Windows passwords are easier to crack today than they were 18 years ago. “On a circa­1998 computer with a Pentium II 400 MHz CPU, the original L0phtCrack could crack a Windows NT, 8 character long alphanumeric password in 24 hours. On a 2016 gaming machine, at less hardware cost, L0phtCrack 7 can crack the same passwords stored on the latest Windows 10 in 2 hours,” said the firm in a statement.
    [Show full text]