SlideShare a Scribd company logo
1 of 65
Passwords & Security#Finse2011 Per Thorsheim CISA, CISM, CISSP-ISSAP securitynirvana.blogspot.com
Disclaimer My presentation, as well as anything I say, do, show, demonstrate, give away or try to sell you is my personal stuff & opinions. My employer have chosen not to be a part of this in any way, as such my employer cannot and will not be held liable. My opinions does not necessarily reflect that of my employer, our customers or partners. Etc etc.
About me Valid certifications: Certified Information Systems Auditor Certified Information Security Manager Certified Information Systems Security Professional Information Systems Security Architecture Professional ITIL v3 Foundations Passwords^10 conference in December 2010 Videos: http://ftp.ii.uib.no/pub/passwords10/
Passwords^11, June 7-8, Bergen Prof. Frank Stajano (Cambridge) Prof. KirsiHelkala (Gjøvik) Simon Josefsson(Head of  R&D, Yubico) Bendik Mjaaland (Accenture) John Arild M. Johansen (CSO, Buypass) Erlend Dyrnes(CSO, Nextgentel) Chris Lyon(Mozilla) James Nobis(Freerainbowtables.com) DmitrySklyarov(Elcomsoft)
Examples
Sony Playstation Network 70+ million accountscompromised #PSNunavailable for 3 weeks Playstation store unavailable for 4 weeks New firmware: v3.61 All passwords must be changed
#PSNPassword Reset Playstation Online (web)
PS3 Policy #1 Revealed Playstation Online (web)
PS3 Policy #2 Revealed Playstation Online (web)
Web Password Reset CAPTCHA Playstation Online (web)
#PSNPartial CC Data Stored Playstation Online (web)
PS3 vs Web – Policy Comparison Playstation Online (web)
#PSNPassword Reset Playstation Online (web)
#PSN – There’s more!
Sony BGM Greece
Bergen Bompengeselskap AS
Login (https)
I Forgot My Password!
Which Language Sir?
E-mail received:
Or: License Number + Tag ID…
Breaking in – online attacks
Todo List Weneed: Usernames and/or usernamealgorithm at targetcorp Windows domain (if applicable) Account lockout policy FQDN to webmail service Online passwordcracker Somepasswords(statisticsareyourfriend!) (Google is yourfriend…) And patience… 
Online Password Attacks Ncrack THC Hydra Medusa http://www.thc.org/thc-hydra/network_password_cracker_comparison.html
Possible targets found: Potential targets: Webmail.ntnu.no Webmail.inbox.com Webmail.nr.no Webmail.uib.no Webmail.unik.no Webmail.uia.no Webmail.uni.lu
Offline Password Attacks
Got Hash? SQL Injection Attacks: SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. Source: Wikipedia 
Hashkiller.com
Cracking Passwords
Offline password cracking A widenumberoftools& techniquesavailable: Rainbowtables Dictionary attacks Various hybrid/logicalattacks Bruteforce Time is on your side!
RainbowTables (wikipedia) A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering the plaintext password, up to a certain length consisting of a limited set of characters. It is a form of time-memory tradeoff, using less CPU at the cost of more storage. Proper key derivation functions employ salt to make this attack infeasible. Rainbow tables are a refinement of an earlier, simpler algorithm by Martin Hellman that used the inversion of hashes by looking up precomputed hash chains.
RainbowTablesavailable: Freerainbowtables.com (99.9% hitrate) LM/NTLM, MD5, SHA-1, HALFLMCHALL CPU/GPU generation, CPU cracking (for now) Project-rainbowcrack.com LM/NTLM, MD5, SHA-1 (CPU/GPU) Cryptohaze.com MD5, NTLM  (Full US charset, chainlength 200k, GPU only!)
lm_lm-frt-cp437-850#1-7_20000 Windows LM passwordslength 1-14 566Gb (1400+ files) tableset;charsetcoverage:
ntlm_mixalpha-numeric#1-8_40000 Windows NTLM Mixalpha_numeric_1-8 453Gb, covers A-Z,a-z,0-9
Hybrid Rainbowtables ntlm_hybrid2(alpha#1-1,loweralpha#5-5,loweralpha-numeric#2-2,numeric#1-3)  is currently being finished by freerainbowtables.com With more to come!
Hybrid attacks John the Ripper (JtR) www.openwall.com/john/ Hashcat family (lite, plus, ocl) Hashcat.net Cain & Abel www.oxid.it … And many, many more!
Bruteforce Bruteforcing is increasingly hard to do; Graphics Processing Units (GPUs) to therescue!
PasswordStatistics Time to show some cool/interesting/boring numbers!
Password Resets
Storing passwords «I’musing MD5, so I’m safe.» Response from web applicationdeveloperafter I talkedabout storing passwords in cleartextbeing a bad idea.
Thomas Ptacek Enough With The RainbowTables: WhatYouNeed To KnowAboutSecurePasswordSchemes http://chargen.matasano.com/chargen/2007/9/7/enough-with-the-rainbow-tables-what-you-need-to-know-about-s.html
Lastpass.com Source: http://blog.lastpass.com/2011/05/lastpass-security-notification.html
Chris Lyon “SHA-512 w/ per User Salts is Not Enough” http://cslyon.net/2011/05/10/sha-512-w-per-user-salts-is-not-enough/
BypassingPassword Security
BypassingPassword Security Microsoft Windows Pass-the-Hashattacks Microsoft Windows Pass-the-Ticketattacks Forensictoolkits Passware – «bypassing» Microsoft Bitlocker ElcomsoftEPPB Smartphone (in)security
Pass-the-Hash / Pass-the-Ticket Windows Credentials Editor v1.2: http://www.ampliasecurity.com/research.html Scenario description: Eve just started in Alices company. Bob, thedomainadminguy, givesyouyour brand newlaptop, ready to use. You have localadminrights. Bob’slogincredentialsarecached on your computer. Extract, send credentials (username + hashvalue), getaccess.
Passware Kit Forensic vs Microsoft Bitlocker: Live memory dump from target system usingFirewire, utilizingDirect Memory Access. Search dump, getdecryption keys, getaccess Remove disk from hibernated computer. Physicalmemory is written to disk, parts of it unencrypted. Searchand finddecryption keys, mount volume, getaccess. Video demonstration:  http://ftp.ii.uib.no/pub/passwords10/Passware_at_Passwords10.mp4
CorporateAndroid Security Android devices: no hardware encryption Nitro software – softwareencryption Butonly for Microsoft Activesync data (Mail, Calendar, Contacts) Samsung Galaxy S II Hardware deviceencryption 90% of all MS Activesyncpoliciessupported Not even Microsoft doesthat!
CorporateiOS Security
CorporateiOS Security AES hardware deviceencryption is good, but.. iTunes configurationissues Frequentupdates(Quicktime + Safari + iTunes) Backuppasswordprotection Hardware Device has «passwordprotect» flag Withoutpasswordprotection: Device-specificencryption key is used to protectkeychain Almost all other data availableunencrypted in backup
Elcomsoft, Tuesday, May 24th: http://www.prweb.com/releases/iPhone/forensics/prweb8470927.htm
PasswordUsability
NorSIS / nettvett.no (Norway)
PasswordUsability Minimum/Maximum Length Complexityrequirements PasswordHistory ChangeFrequency Lost Password (Password Reset) Reauthentication (BankID) Single Sign-On
Usabilityvs Security Minimum/Maximum Length Complexityrequirements PasswordHistory ChangeFrequency Lost Password (Password Reset) Reauthentication (BankID) Single Sign-On Usepassphrases / implement support for it! Length = complexity Patterndetection «Windowofopportunity» VERY hard to do in real-life environments! «Dearmom…» Goodidea, but…
Recommendations
My User Recommendation: Use a normal sentence as yourpassword. Change it whenyouthink it is necessary.
My Policy Recommendation: Use a normal sentence as yourpassword. It must be changedevery 13 months.
Technical Recommendation Has to be a little more complexthentheprevious slides, but; Do NOT tell your end-users or othersabouttheactualrulesimplemented! Provideuseful feedback whenpasswordsarerejected Do 100% technicalimplementationofwritten policy SSO: store passwordhashes at thestrongest system
DynamicPreventionofCommonPasswords Somewebsites have static lists of «forbidden» (common) passwords Can be found & documented (Twitter…) Does not providebettersecurity Easilycircumvented (blocking bad passwords is hard!)
DynamicPreventionofCommonPasswords My suggestion: A custom DLL for Windows. It receives a usersrequestedpassword. Checkagainstrules (length, complexity, historyetc). If OK, thenhash and store hashwithcounter= 1 DLL config has a thresholdvalue Any given passwordcanonlyexist on X accounts at the same time
Thankyou! And do not forget: Passwords^11, June 7-8, UiB, Bergen.  2 days, onlyaboutpasswords.

More Related Content

What's hot

Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearydrewz lin
 
When you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the massesWhen you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the massesMichele Orru
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hackingTjylen Veselyj
 
Csrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equalCsrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equaldrewz lin
 
Reversing & malware analysis training part 8 malware memory forensics
Reversing & malware analysis training part 8   malware memory forensicsReversing & malware analysis training part 8   malware memory forensics
Reversing & malware analysis training part 8 malware memory forensicsAbdulrahman Bassam
 
BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!ThreatReel Podcast
 
Password Cracking
Password Cracking Password Cracking
Password Cracking Sina Manavi
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key loggerPatel Mit
 
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...Jakub Kałużny
 
Security talk: Fortifying your Joomla! website
Security talk: Fortifying your Joomla! websiteSecurity talk: Fortifying your Joomla! website
Security talk: Fortifying your Joomla! websiteSigsiu.NET
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksThreatReel Podcast
 
Security Theatre - AmsterdamPHP
Security Theatre - AmsterdamPHPSecurity Theatre - AmsterdamPHP
Security Theatre - AmsterdamPHPxsist10
 
Unmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouUnmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouE Hacking
 
Http only cookie
Http only cookieHttp only cookie
Http only cookiefool2fish
 
Password hacking
Password hackingPassword hacking
Password hackingAbhay pal
 
Abusing & Securing XPC in macOS apps
Abusing & Securing XPC in macOS appsAbusing & Securing XPC in macOS apps
Abusing & Securing XPC in macOS appsSecuRing
 

What's hot (20)

Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
When you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the massesWhen you don't have 0days: client-side exploitation for the masses
When you don't have 0days: client-side exploitation for the masses
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 
Csrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equalCsrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equal
 
Reversing & malware analysis training part 8 malware memory forensics
Reversing & malware analysis training part 8   malware memory forensicsReversing & malware analysis training part 8   malware memory forensics
Reversing & malware analysis training part 8 malware memory forensics
 
BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
Password management
Password managementPassword management
Password management
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
 
Security talk: Fortifying your Joomla! website
Security talk: Fortifying your Joomla! websiteSecurity talk: Fortifying your Joomla! website
Security talk: Fortifying your Joomla! website
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal Tricks
 
Security Theatre - AmsterdamPHP
Security Theatre - AmsterdamPHPSecurity Theatre - AmsterdamPHP
Security Theatre - AmsterdamPHP
 
Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)
 
Unmasking or De-Anonymizing You
Unmasking or De-Anonymizing YouUnmasking or De-Anonymizing You
Unmasking or De-Anonymizing You
 
Http only cookie
Http only cookieHttp only cookie
Http only cookie
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Abusing & Securing XPC in macOS apps
Abusing & Securing XPC in macOS appsAbusing & Securing XPC in macOS apps
Abusing & Securing XPC in macOS apps
 

Similar to Passwords & security

DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD PipelineJames Wickett
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineJames Wickett
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Jim Manico
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDJames Wickett
 
A pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsA pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsB.A.
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftSchipul - The Web Marketing Company
 
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
 DDD17 - Web Applications Automated Security Testing in a Continuous Delivery... DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...Fedir RYKHTIK
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxFernandoVizer
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDJames Wickett
 
Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007Stephan Chenette
 
How to hide your browser 0-days
How to hide your browser 0-daysHow to hide your browser 0-days
How to hide your browser 0-daysZoltan Balazs
 
Building your macOS Baseline Requirements MacadUK 2018
Building your macOS Baseline Requirements MacadUK 2018Building your macOS Baseline Requirements MacadUK 2018
Building your macOS Baseline Requirements MacadUK 2018Henry Stamerjohann
 
Chapter 4 access control fundamental ii
Chapter 4   access control fundamental iiChapter 4   access control fundamental ii
Chapter 4 access control fundamental iiSyaiful Ahdan
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Fordham Tech. Innovators - Password Management Presentation
Fordham Tech. Innovators - Password Management PresentationFordham Tech. Innovators - Password Management Presentation
Fordham Tech. Innovators - Password Management Presentationbehnkejh
 

Similar to Passwords & security (20)

DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD Pipeline
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
A pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsA pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security Solutions
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
 
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
 DDD17 - Web Applications Automated Security Testing in a Continuous Delivery... DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
 
Rust Hack
Rust HackRust Hack
Rust Hack
 
Password Attack
Password Attack Password Attack
Password Attack
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007
 
How to hide your browser 0-days
How to hide your browser 0-daysHow to hide your browser 0-days
How to hide your browser 0-days
 
Building your macOS Baseline Requirements MacadUK 2018
Building your macOS Baseline Requirements MacadUK 2018Building your macOS Baseline Requirements MacadUK 2018
Building your macOS Baseline Requirements MacadUK 2018
 
Hakin9 05 2013
Hakin9 05 2013Hakin9 05 2013
Hakin9 05 2013
 
Chapter 4 access control fundamental ii
Chapter 4   access control fundamental iiChapter 4   access control fundamental ii
Chapter 4 access control fundamental ii
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Fordham Tech. Innovators - Password Management Presentation
Fordham Tech. Innovators - Password Management PresentationFordham Tech. Innovators - Password Management Presentation
Fordham Tech. Innovators - Password Management Presentation
 

More from Per Thorsheim

Bergen næringsråd 14122011-per-thorsheim
Bergen næringsråd 14122011-per-thorsheimBergen næringsråd 14122011-per-thorsheim
Bergen næringsråd 14122011-per-thorsheimPer Thorsheim
 
WhatsHot Stavanger 2011 - Per Thorsheim
WhatsHot Stavanger 2011 - Per ThorsheimWhatsHot Stavanger 2011 - Per Thorsheim
WhatsHot Stavanger 2011 - Per ThorsheimPer Thorsheim
 
Er styremedlemmer en sikkerhetsrisiko?
Er styremedlemmer en sikkerhetsrisiko?Er styremedlemmer en sikkerhetsrisiko?
Er styremedlemmer en sikkerhetsrisiko?Per Thorsheim
 
Brettvett og Skyvett
Brettvett og SkyvettBrettvett og Skyvett
Brettvett og SkyvettPer Thorsheim
 
Passord - fremdeles den store synderen?
Passord - fremdeles den store synderen?Passord - fremdeles den store synderen?
Passord - fremdeles den store synderen?Per Thorsheim
 
Boring password statistics
Boring password statisticsBoring password statistics
Boring password statisticsPer Thorsheim
 
Board Member Security
Board Member SecurityBoard Member Security
Board Member SecurityPer Thorsheim
 
Firsttuesday Per Thorsheim
Firsttuesday Per ThorsheimFirsttuesday Per Thorsheim
Firsttuesday Per ThorsheimPer Thorsheim
 
Hackers Pub Per Thorsheim Jan 31, 2011
Hackers Pub Per Thorsheim Jan 31, 2011Hackers Pub Per Thorsheim Jan 31, 2011
Hackers Pub Per Thorsheim Jan 31, 2011Per Thorsheim
 
Creating Secure Passwords
Creating Secure PasswordsCreating Secure Passwords
Creating Secure PasswordsPer Thorsheim
 

More from Per Thorsheim (11)

Bergen næringsråd 14122011-per-thorsheim
Bergen næringsråd 14122011-per-thorsheimBergen næringsråd 14122011-per-thorsheim
Bergen næringsråd 14122011-per-thorsheim
 
WhatsHot Stavanger 2011 - Per Thorsheim
WhatsHot Stavanger 2011 - Per ThorsheimWhatsHot Stavanger 2011 - Per Thorsheim
WhatsHot Stavanger 2011 - Per Thorsheim
 
Er styremedlemmer en sikkerhetsrisiko?
Er styremedlemmer en sikkerhetsrisiko?Er styremedlemmer en sikkerhetsrisiko?
Er styremedlemmer en sikkerhetsrisiko?
 
Brettvett og Skyvett
Brettvett og SkyvettBrettvett og Skyvett
Brettvett og Skyvett
 
Passord - fremdeles den store synderen?
Passord - fremdeles den store synderen?Passord - fremdeles den store synderen?
Passord - fremdeles den store synderen?
 
Boring password statistics
Boring password statisticsBoring password statistics
Boring password statistics
 
Board Member Security
Board Member SecurityBoard Member Security
Board Member Security
 
Firsttuesday Per Thorsheim
Firsttuesday Per ThorsheimFirsttuesday Per Thorsheim
Firsttuesday Per Thorsheim
 
Hackers Pub Per Thorsheim Jan 31, 2011
Hackers Pub Per Thorsheim Jan 31, 2011Hackers Pub Per Thorsheim Jan 31, 2011
Hackers Pub Per Thorsheim Jan 31, 2011
 
Creating Secure Passwords
Creating Secure PasswordsCreating Secure Passwords
Creating Secure Passwords
 
Styresikkerhet
StyresikkerhetStyresikkerhet
Styresikkerhet
 

Recently uploaded

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 

Recently uploaded (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Passwords & security

  • 1. Passwords & Security#Finse2011 Per Thorsheim CISA, CISM, CISSP-ISSAP securitynirvana.blogspot.com
  • 2. Disclaimer My presentation, as well as anything I say, do, show, demonstrate, give away or try to sell you is my personal stuff & opinions. My employer have chosen not to be a part of this in any way, as such my employer cannot and will not be held liable. My opinions does not necessarily reflect that of my employer, our customers or partners. Etc etc.
  • 3.
  • 4. About me Valid certifications: Certified Information Systems Auditor Certified Information Security Manager Certified Information Systems Security Professional Information Systems Security Architecture Professional ITIL v3 Foundations Passwords^10 conference in December 2010 Videos: http://ftp.ii.uib.no/pub/passwords10/
  • 5. Passwords^11, June 7-8, Bergen Prof. Frank Stajano (Cambridge) Prof. KirsiHelkala (Gjøvik) Simon Josefsson(Head of R&D, Yubico) Bendik Mjaaland (Accenture) John Arild M. Johansen (CSO, Buypass) Erlend Dyrnes(CSO, Nextgentel) Chris Lyon(Mozilla) James Nobis(Freerainbowtables.com) DmitrySklyarov(Elcomsoft)
  • 7. Sony Playstation Network 70+ million accountscompromised #PSNunavailable for 3 weeks Playstation store unavailable for 4 weeks New firmware: v3.61 All passwords must be changed
  • 9. PS3 Policy #1 Revealed Playstation Online (web)
  • 10. PS3 Policy #2 Revealed Playstation Online (web)
  • 11. Web Password Reset CAPTCHA Playstation Online (web)
  • 12. #PSNPartial CC Data Stored Playstation Online (web)
  • 13. PS3 vs Web – Policy Comparison Playstation Online (web)
  • 19. I Forgot My Password!
  • 22. Or: License Number + Tag ID…
  • 23. Breaking in – online attacks
  • 24. Todo List Weneed: Usernames and/or usernamealgorithm at targetcorp Windows domain (if applicable) Account lockout policy FQDN to webmail service Online passwordcracker Somepasswords(statisticsareyourfriend!) (Google is yourfriend…) And patience… 
  • 25. Online Password Attacks Ncrack THC Hydra Medusa http://www.thc.org/thc-hydra/network_password_cracker_comparison.html
  • 26. Possible targets found: Potential targets: Webmail.ntnu.no Webmail.inbox.com Webmail.nr.no Webmail.uib.no Webmail.unik.no Webmail.uia.no Webmail.uni.lu
  • 28. Got Hash? SQL Injection Attacks: SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. Source: Wikipedia 
  • 31. Offline password cracking A widenumberoftools& techniquesavailable: Rainbowtables Dictionary attacks Various hybrid/logicalattacks Bruteforce Time is on your side!
  • 32. RainbowTables (wikipedia) A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering the plaintext password, up to a certain length consisting of a limited set of characters. It is a form of time-memory tradeoff, using less CPU at the cost of more storage. Proper key derivation functions employ salt to make this attack infeasible. Rainbow tables are a refinement of an earlier, simpler algorithm by Martin Hellman that used the inversion of hashes by looking up precomputed hash chains.
  • 33. RainbowTablesavailable: Freerainbowtables.com (99.9% hitrate) LM/NTLM, MD5, SHA-1, HALFLMCHALL CPU/GPU generation, CPU cracking (for now) Project-rainbowcrack.com LM/NTLM, MD5, SHA-1 (CPU/GPU) Cryptohaze.com MD5, NTLM (Full US charset, chainlength 200k, GPU only!)
  • 34. lm_lm-frt-cp437-850#1-7_20000 Windows LM passwordslength 1-14 566Gb (1400+ files) tableset;charsetcoverage:
  • 35. ntlm_mixalpha-numeric#1-8_40000 Windows NTLM Mixalpha_numeric_1-8 453Gb, covers A-Z,a-z,0-9
  • 36. Hybrid Rainbowtables ntlm_hybrid2(alpha#1-1,loweralpha#5-5,loweralpha-numeric#2-2,numeric#1-3) is currently being finished by freerainbowtables.com With more to come!
  • 37. Hybrid attacks John the Ripper (JtR) www.openwall.com/john/ Hashcat family (lite, plus, ocl) Hashcat.net Cain & Abel www.oxid.it … And many, many more!
  • 38. Bruteforce Bruteforcing is increasingly hard to do; Graphics Processing Units (GPUs) to therescue!
  • 39. PasswordStatistics Time to show some cool/interesting/boring numbers!
  • 41. Storing passwords «I’musing MD5, so I’m safe.» Response from web applicationdeveloperafter I talkedabout storing passwords in cleartextbeing a bad idea.
  • 42. Thomas Ptacek Enough With The RainbowTables: WhatYouNeed To KnowAboutSecurePasswordSchemes http://chargen.matasano.com/chargen/2007/9/7/enough-with-the-rainbow-tables-what-you-need-to-know-about-s.html
  • 44. Chris Lyon “SHA-512 w/ per User Salts is Not Enough” http://cslyon.net/2011/05/10/sha-512-w-per-user-salts-is-not-enough/
  • 46. BypassingPassword Security Microsoft Windows Pass-the-Hashattacks Microsoft Windows Pass-the-Ticketattacks Forensictoolkits Passware – «bypassing» Microsoft Bitlocker ElcomsoftEPPB Smartphone (in)security
  • 47. Pass-the-Hash / Pass-the-Ticket Windows Credentials Editor v1.2: http://www.ampliasecurity.com/research.html Scenario description: Eve just started in Alices company. Bob, thedomainadminguy, givesyouyour brand newlaptop, ready to use. You have localadminrights. Bob’slogincredentialsarecached on your computer. Extract, send credentials (username + hashvalue), getaccess.
  • 48. Passware Kit Forensic vs Microsoft Bitlocker: Live memory dump from target system usingFirewire, utilizingDirect Memory Access. Search dump, getdecryption keys, getaccess Remove disk from hibernated computer. Physicalmemory is written to disk, parts of it unencrypted. Searchand finddecryption keys, mount volume, getaccess. Video demonstration: http://ftp.ii.uib.no/pub/passwords10/Passware_at_Passwords10.mp4
  • 49. CorporateAndroid Security Android devices: no hardware encryption Nitro software – softwareencryption Butonly for Microsoft Activesync data (Mail, Calendar, Contacts) Samsung Galaxy S II Hardware deviceencryption 90% of all MS Activesyncpoliciessupported Not even Microsoft doesthat!
  • 51.
  • 52.
  • 53. CorporateiOS Security AES hardware deviceencryption is good, but.. iTunes configurationissues Frequentupdates(Quicktime + Safari + iTunes) Backuppasswordprotection Hardware Device has «passwordprotect» flag Withoutpasswordprotection: Device-specificencryption key is used to protectkeychain Almost all other data availableunencrypted in backup
  • 54. Elcomsoft, Tuesday, May 24th: http://www.prweb.com/releases/iPhone/forensics/prweb8470927.htm
  • 57. PasswordUsability Minimum/Maximum Length Complexityrequirements PasswordHistory ChangeFrequency Lost Password (Password Reset) Reauthentication (BankID) Single Sign-On
  • 58. Usabilityvs Security Minimum/Maximum Length Complexityrequirements PasswordHistory ChangeFrequency Lost Password (Password Reset) Reauthentication (BankID) Single Sign-On Usepassphrases / implement support for it! Length = complexity Patterndetection «Windowofopportunity» VERY hard to do in real-life environments! «Dearmom…» Goodidea, but…
  • 60. My User Recommendation: Use a normal sentence as yourpassword. Change it whenyouthink it is necessary.
  • 61. My Policy Recommendation: Use a normal sentence as yourpassword. It must be changedevery 13 months.
  • 62. Technical Recommendation Has to be a little more complexthentheprevious slides, but; Do NOT tell your end-users or othersabouttheactualrulesimplemented! Provideuseful feedback whenpasswordsarerejected Do 100% technicalimplementationofwritten policy SSO: store passwordhashes at thestrongest system
  • 63. DynamicPreventionofCommonPasswords Somewebsites have static lists of «forbidden» (common) passwords Can be found & documented (Twitter…) Does not providebettersecurity Easilycircumvented (blocking bad passwords is hard!)
  • 64. DynamicPreventionofCommonPasswords My suggestion: A custom DLL for Windows. It receives a usersrequestedpassword. Checkagainstrules (length, complexity, historyetc). If OK, thenhash and store hashwithcounter= 1 DLL config has a thresholdvalue Any given passwordcanonlyexist on X accounts at the same time
  • 65. Thankyou! And do not forget: Passwords^11, June 7-8, UiB, Bergen. 2 days, onlyaboutpasswords.