SlideShare a Scribd company logo
1 of 14
ERROR!
THE SYSTEM DOESN’T EXSIST!!!!!!!!
Change your mindset.
You are the only protection for yourself on the Internet.
Password = Encrypted Hash Stored
Example: Fluffy = 3d5ddc7000ad649a950c279fd559147c
What is a Password?
Definition: a sequence of
characters required for
access to a computer
system. Stored on
systems as an encrypted
hash to prevent
unauthorized access.
3d5ddc7000ad649a950c279fd559147c
A906449d5769fa7361d7ecc6aa3f6d28 == 123abc
E10adc3949ba59abbe56e057f20f883e == 123456
8bd7a1153a88761ad9d37e2f2394c947 == Love
3d5ddc7000ad649a950c279fd559147c == Fluffy
4ad6c928711328d1cf0167bc87079a14 == Hate
a870ca58701c25b7f210a4964f31ceae == airforce
5b9ea0931b3da1aa543ed41a03cacbd2 == Hairy
31ba6d3619a6d70c983151afa0764de4 == Military
How do password crackers work?
JTR Password ListTarget Password Hash
-- Password Lists can be 10TB or greater!!!
-- Usually common passwords and words
-- Lists can be made for specific hobbies, careers, religion, etc.
-- More than one list can be ran with JTR
Types of Passwords
#ofChar Lower Case letters and digits mixed case letters single case letters with digits,
symbols and punctuation
all the displayable ASCII characters
including mixed case letters
3 0.02 seconds 04.7 seconds 0.14 seconds 0.33 seconds 0.86 seconds
4 0.46 seconds 1.68 seconds 7.31 seconds 22.7 seconds 1.36 minutes
5 11.9 seconds 1.01 minutes 6.34 minutes 26.1 minutes 2.15 hours
6 5.15 minutes 36.3 minutes 5.59 hours 1.25 days 8.51 days
7 2.23 hours 21.8 hours 11.9 days 2.83 months 2.21 years
8 2.42 days 1.07 months 1.70 years 16.3 years 2.10 centuries
9 2.07 months 3.22 years 88.2 years 1.12 millennia 20 millennia
10 4.48 years 1.16 centuries 4.58 millennia 77.6 millennia 1,899 millennia
11 1.16 centuries 4.17 millennia 238 millennia 5,352 millennia 180,365 millennia
12 3.03 millennia 150 millennia 12,395 millennia 369,303 millennia 17,184,705 millennia
13 78.7 millennia 5,410 millennia 644,521 millennia 25,481,886 millennia 1,627,797,068 millennia
14 2,046 millennia 194,728 millennia 33,515,076 millennia 1,758,250,151 millennia 154,640,721,434 millennia
The table below is calculated by assuming 1,000,000
encryption operations per second (or password guesses);
this is a plausible number for a desktop PC in early 2007.
Every 18 months the average PC will double it’s processing
power which would increase password guesses per second.
The speed of PC-based password guessing will increase
100% every decade.
Is your Password Crack-able?
 · Don't use passwords that are based on personal information that can be
easily accessed or guessed. (SSN, phone, name, job)
 · Don't use words that can be found in any dictionary of any language.
Password crackers use dictionary words to crack your passwords. It
doesn’t matter if you use “P@ssword” or “passw0rd”.
 · Develop a mnemonic for remembering complex passwords. ( i.e.
keyboard pattern )
 · Use both lowercase and capital letters.
 · Use a combination of letters, numbers, and special characters.
 · Use passphrases when you can. “i.e: a sentence from you favorite book.”
 Do NOT use ‘password hints’ at all. Example “The color of Bart
Simpson’s hair”. – umm…really?
 Use 10 or more characters for passwords.
 · Use different passwords on different systems. If the hacker gets one,
they’ll have it all.
 Keep in mind that if a Hacker gets your Username, they are already
halfway in your account.
Why secure your home network?
-- Crackers will ‘pivot’ with your network, placing all blame on you
-- Crackers use the easiest targets without security updates and weak passwords
-- Crackers work with stolen credentials, usernames, passwords. How do you
think they get them? They use yours.
-- Crackers are funded by your bank account.
“Cracker”
Definition: Criminal Hacker.
A person who illegally gains access to
and sometimes tampers with
information in a computer system
How do Crackers gets in?…
…very easily…
…if you’re not protected.
 To explain how to protect yourself, you need to learn
‘what’ to protect. Within one internet connection, there
are 65,635 transmission ports to send and receive
different services on your computer. Think of it like
65,635 straws inside of one large pipe. This is how you
can send and receive email as you simultaneously surf
the web and listen to online music. Listed below are
some of the common standard ports:
So how do you protect yourself?
Service Transmission Port
Internet Explorer/Firefox/HTTP/HTML/unsecure web surfing 80
Internet Explorer/Firefox/HTTP/HTML/Secure web surfing 443
Download Email/Post Office Protocol 3 (POP3) 110
Send Email/Simple Mail Transfer Protocol (SMTP) 25
Music streaming/Pandora 5000 or 6000
Network File Sharing 139 and 445
So how do you protect yourself?
Typical Firewall Setup
Definition: a firewall is a device or set of devices
designed to permit or deny network transmissions
based upon a set of rules and is frequently used to
protect networks from unauthorized access while
permitting legitimate communications to pass.
-- Most commercial home routers have a standard built-in firewall included.
However they may not be turned on and require the user to activate.
WIFI Security: Why you should never use WEP
This is my WIFI with WEP security. I broke into it
after 5 mins of setup time and 30 seconds to crack
the WEP key. There are youtube videos on how to
crack WEP that are open to the public.
Wardriving is the act of
searching for Wi-Fi
wireless networks by a
person in a moving vehicle,
using a portable computer,
smartphone or personal
digital assistant (PDA).
Sometimes used for
malicious activity. Open
WIFI and WEP encryption
are the top targets.
 Do’s
 Use a firewall or router for your private network
 Only open ports in firewall if absolutely needed. (I.E. : if running your own website or public service from home).
Be sure you know what you are doing with this. If unsure, block everything.
 Install antivirus on all computers within your private network. This is free through the DoD Home-Use Program.
 Only go to trusted websites. Usually .com, .mil, .gov, .org. This is usually a ‘judgment call’.
 Install operating system security updates at least once a week. These close vulnerabilities that can allow a Cracker
remote access to your computer either with a virus or directly. Sometimes even with an active firewall installed.
 Use WPA or WPA2 for WIFI security with a complex 10+ char password. Never use WEP security or an open WIFI
since these can be an open door for “wardrivers” which will allow them to use your network for malicious activity.
This can place all blame on you if your ISP happens to audit your network traffic.
 Be aware that some multiplayer games and internet software have little or no security and can open your network
to Crackers.
 Don’ts
 Never go to websites that are vectors for viruses like porn sites, hacker sites, crack sites, game sites and file sharing
programs. Most infected websites will install viruses and Trojans straight from the webpage itself. Installs will be
invisible to the user. Antivirus software doesn’t catch everything. Some viruses use “zero-day” exploits which are
exploits that are currently unknown to antivirus companies. If it seems ‘dark’ in nature, then it’s probably a vector
for viruses.
 Stop using your windows built-in administrator to log in. Disable login privileges on this account. Enable a user
account on windows computers with limited install privileges and only invoke the admin account when installing
software. This will allow the user to know if software is being installed without approval. This can stop most
viruses and Trojans from being installed.
 Never activate remote access to your router from the Internet. Why would you? This is just dumb.
 Bottom-line: If you are not sure, don’t do it.
Do’s and Don’ts for Private Networks
 Review:
 Personal Internet Security System doesn’t exist!
 Password Etiquette
 Private Network Security
 Use WPA2 Only!
 Google Hacking

More Related Content

What's hot

S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
azman21
 
Cyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small BusinessesCyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small Businesses
PECB
 
Reversing & malware analysis training part 8 malware memory forensics
Reversing & malware analysis training part 8   malware memory forensicsReversing & malware analysis training part 8   malware memory forensics
Reversing & malware analysis training part 8 malware memory forensics
Abdulrahman Bassam
 

What's hot (20)

Spyware
SpywareSpyware
Spyware
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Protect your pc
Protect your pcProtect your pc
Protect your pc
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda Security
 
spyware
spyware spyware
spyware
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Password Attack
Password Attack Password Attack
Password Attack
 
Ultimate Guide to Setup DarkComet with NoIP
Ultimate Guide to Setup DarkComet with NoIPUltimate Guide to Setup DarkComet with NoIP
Ultimate Guide to Setup DarkComet with NoIP
 
Seminar1
Seminar1Seminar1
Seminar1
 
Cybercrime - Why we're not doomed after all
Cybercrime - Why we're not doomed after allCybercrime - Why we're not doomed after all
Cybercrime - Why we're not doomed after all
 
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesCeh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniques
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Cyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small BusinessesCyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small Businesses
 
Reversing & malware analysis training part 8 malware memory forensics
Reversing & malware analysis training part 8   malware memory forensicsReversing & malware analysis training part 8   malware memory forensics
Reversing & malware analysis training part 8 malware memory forensics
 
Brute Force Attack
Brute Force AttackBrute Force Attack
Brute Force Attack
 
What is hacking
What is hackingWhat is hacking
What is hacking
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security
 

Viewers also liked

JT Presentation Finance for HRs
JT Presentation Finance for HRsJT Presentation Finance for HRs
JT Presentation Finance for HRs
JobTiger Ltd.
 
2014 Holiday card and envelope
2014 Holiday card and envelope2014 Holiday card and envelope
2014 Holiday card and envelope
Mike Gallagher
 
Abordaje diagnostico y tratamiento Hipoglucemia
Abordaje diagnostico y tratamiento HipoglucemiaAbordaje diagnostico y tratamiento Hipoglucemia
Abordaje diagnostico y tratamiento Hipoglucemia
Carlos Morales
 

Viewers also liked (19)

Karambola
KarambolaKarambola
Karambola
 
JT Presentation Finance for HRs
JT Presentation Finance for HRsJT Presentation Finance for HRs
JT Presentation Finance for HRs
 
Periodismo digital
Periodismo digitalPeriodismo digital
Periodismo digital
 
Mordeduras y picaduras_de_animales
Mordeduras y picaduras_de_animalesMordeduras y picaduras_de_animales
Mordeduras y picaduras_de_animales
 
HTA
HTAHTA
HTA
 
Ley del aborto en los diferentes países definitivo (1)
Ley del aborto en los diferentes países definitivo (1)Ley del aborto en los diferentes países definitivo (1)
Ley del aborto en los diferentes países definitivo (1)
 
2014 Holiday card and envelope
2014 Holiday card and envelope2014 Holiday card and envelope
2014 Holiday card and envelope
 
Educ 1724 teaching pronuciation
Educ 1724 teaching pronuciationEduc 1724 teaching pronuciation
Educ 1724 teaching pronuciation
 
Atención de enfermería en pacientes diabéticos
Atención de enfermería en pacientes diabéticosAtención de enfermería en pacientes diabéticos
Atención de enfermería en pacientes diabéticos
 
Hipoglucemias
HipoglucemiasHipoglucemias
Hipoglucemias
 
Vía aérea dificultosa 2015
Vía aérea dificultosa 2015Vía aérea dificultosa 2015
Vía aérea dificultosa 2015
 
Interpretacion Ecg
Interpretacion EcgInterpretacion Ecg
Interpretacion Ecg
 
Abordaje diagnostico y tratamiento Hipoglucemia
Abordaje diagnostico y tratamiento HipoglucemiaAbordaje diagnostico y tratamiento Hipoglucemia
Abordaje diagnostico y tratamiento Hipoglucemia
 
Mordeduras de perros
Mordeduras de perrosMordeduras de perros
Mordeduras de perros
 
Intoxicación por etanol 2015
Intoxicación por  etanol 2015Intoxicación por  etanol 2015
Intoxicación por etanol 2015
 
Product Design using Lean UX
Product Design using Lean UXProduct Design using Lean UX
Product Design using Lean UX
 
Formation of coastline
Formation of coastlineFormation of coastline
Formation of coastline
 
Promethazine hcl 58-33-3-api
Promethazine hcl 58-33-3-apiPromethazine hcl 58-33-3-api
Promethazine hcl 58-33-3-api
 
COKE
COKECOKE
COKE
 

Similar to Personal Internet Security System

USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
BilmyRikas
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
sumita02
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
cougarcps
 

Similar to Personal Internet Security System (20)

User security awareness
User security awarenessUser security awareness
User security awareness
 
Security_Awareness_Primer.pptx
Security_Awareness_Primer.pptxSecurity_Awareness_Primer.pptx
Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Internet security
Internet securityInternet security
Internet security
 
Network Security
Network SecurityNetwork Security
Network Security
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
EthicalHacking.pptx
EthicalHacking.pptxEthicalHacking.pptx
EthicalHacking.pptx
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Ransomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 

Recently uploaded

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 

Recently uploaded (20)

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 

Personal Internet Security System

  • 1.
  • 2. ERROR! THE SYSTEM DOESN’T EXSIST!!!!!!!! Change your mindset. You are the only protection for yourself on the Internet.
  • 3. Password = Encrypted Hash Stored Example: Fluffy = 3d5ddc7000ad649a950c279fd559147c What is a Password? Definition: a sequence of characters required for access to a computer system. Stored on systems as an encrypted hash to prevent unauthorized access.
  • 4. 3d5ddc7000ad649a950c279fd559147c A906449d5769fa7361d7ecc6aa3f6d28 == 123abc E10adc3949ba59abbe56e057f20f883e == 123456 8bd7a1153a88761ad9d37e2f2394c947 == Love 3d5ddc7000ad649a950c279fd559147c == Fluffy 4ad6c928711328d1cf0167bc87079a14 == Hate a870ca58701c25b7f210a4964f31ceae == airforce 5b9ea0931b3da1aa543ed41a03cacbd2 == Hairy 31ba6d3619a6d70c983151afa0764de4 == Military How do password crackers work? JTR Password ListTarget Password Hash -- Password Lists can be 10TB or greater!!! -- Usually common passwords and words -- Lists can be made for specific hobbies, careers, religion, etc. -- More than one list can be ran with JTR
  • 5. Types of Passwords #ofChar Lower Case letters and digits mixed case letters single case letters with digits, symbols and punctuation all the displayable ASCII characters including mixed case letters 3 0.02 seconds 04.7 seconds 0.14 seconds 0.33 seconds 0.86 seconds 4 0.46 seconds 1.68 seconds 7.31 seconds 22.7 seconds 1.36 minutes 5 11.9 seconds 1.01 minutes 6.34 minutes 26.1 minutes 2.15 hours 6 5.15 minutes 36.3 minutes 5.59 hours 1.25 days 8.51 days 7 2.23 hours 21.8 hours 11.9 days 2.83 months 2.21 years 8 2.42 days 1.07 months 1.70 years 16.3 years 2.10 centuries 9 2.07 months 3.22 years 88.2 years 1.12 millennia 20 millennia 10 4.48 years 1.16 centuries 4.58 millennia 77.6 millennia 1,899 millennia 11 1.16 centuries 4.17 millennia 238 millennia 5,352 millennia 180,365 millennia 12 3.03 millennia 150 millennia 12,395 millennia 369,303 millennia 17,184,705 millennia 13 78.7 millennia 5,410 millennia 644,521 millennia 25,481,886 millennia 1,627,797,068 millennia 14 2,046 millennia 194,728 millennia 33,515,076 millennia 1,758,250,151 millennia 154,640,721,434 millennia The table below is calculated by assuming 1,000,000 encryption operations per second (or password guesses); this is a plausible number for a desktop PC in early 2007. Every 18 months the average PC will double it’s processing power which would increase password guesses per second. The speed of PC-based password guessing will increase 100% every decade. Is your Password Crack-able?
  • 6.  · Don't use passwords that are based on personal information that can be easily accessed or guessed. (SSN, phone, name, job)  · Don't use words that can be found in any dictionary of any language. Password crackers use dictionary words to crack your passwords. It doesn’t matter if you use “P@ssword” or “passw0rd”.  · Develop a mnemonic for remembering complex passwords. ( i.e. keyboard pattern )  · Use both lowercase and capital letters.  · Use a combination of letters, numbers, and special characters.  · Use passphrases when you can. “i.e: a sentence from you favorite book.”  Do NOT use ‘password hints’ at all. Example “The color of Bart Simpson’s hair”. – umm…really?  Use 10 or more characters for passwords.  · Use different passwords on different systems. If the hacker gets one, they’ll have it all.  Keep in mind that if a Hacker gets your Username, they are already halfway in your account.
  • 7. Why secure your home network? -- Crackers will ‘pivot’ with your network, placing all blame on you -- Crackers use the easiest targets without security updates and weak passwords -- Crackers work with stolen credentials, usernames, passwords. How do you think they get them? They use yours. -- Crackers are funded by your bank account. “Cracker” Definition: Criminal Hacker. A person who illegally gains access to and sometimes tampers with information in a computer system
  • 8. How do Crackers gets in?… …very easily… …if you’re not protected.
  • 9.  To explain how to protect yourself, you need to learn ‘what’ to protect. Within one internet connection, there are 65,635 transmission ports to send and receive different services on your computer. Think of it like 65,635 straws inside of one large pipe. This is how you can send and receive email as you simultaneously surf the web and listen to online music. Listed below are some of the common standard ports: So how do you protect yourself? Service Transmission Port Internet Explorer/Firefox/HTTP/HTML/unsecure web surfing 80 Internet Explorer/Firefox/HTTP/HTML/Secure web surfing 443 Download Email/Post Office Protocol 3 (POP3) 110 Send Email/Simple Mail Transfer Protocol (SMTP) 25 Music streaming/Pandora 5000 or 6000 Network File Sharing 139 and 445
  • 10. So how do you protect yourself? Typical Firewall Setup Definition: a firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. -- Most commercial home routers have a standard built-in firewall included. However they may not be turned on and require the user to activate.
  • 11. WIFI Security: Why you should never use WEP This is my WIFI with WEP security. I broke into it after 5 mins of setup time and 30 seconds to crack the WEP key. There are youtube videos on how to crack WEP that are open to the public. Wardriving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA). Sometimes used for malicious activity. Open WIFI and WEP encryption are the top targets.
  • 12.  Do’s  Use a firewall or router for your private network  Only open ports in firewall if absolutely needed. (I.E. : if running your own website or public service from home). Be sure you know what you are doing with this. If unsure, block everything.  Install antivirus on all computers within your private network. This is free through the DoD Home-Use Program.  Only go to trusted websites. Usually .com, .mil, .gov, .org. This is usually a ‘judgment call’.  Install operating system security updates at least once a week. These close vulnerabilities that can allow a Cracker remote access to your computer either with a virus or directly. Sometimes even with an active firewall installed.  Use WPA or WPA2 for WIFI security with a complex 10+ char password. Never use WEP security or an open WIFI since these can be an open door for “wardrivers” which will allow them to use your network for malicious activity. This can place all blame on you if your ISP happens to audit your network traffic.  Be aware that some multiplayer games and internet software have little or no security and can open your network to Crackers.  Don’ts  Never go to websites that are vectors for viruses like porn sites, hacker sites, crack sites, game sites and file sharing programs. Most infected websites will install viruses and Trojans straight from the webpage itself. Installs will be invisible to the user. Antivirus software doesn’t catch everything. Some viruses use “zero-day” exploits which are exploits that are currently unknown to antivirus companies. If it seems ‘dark’ in nature, then it’s probably a vector for viruses.  Stop using your windows built-in administrator to log in. Disable login privileges on this account. Enable a user account on windows computers with limited install privileges and only invoke the admin account when installing software. This will allow the user to know if software is being installed without approval. This can stop most viruses and Trojans from being installed.  Never activate remote access to your router from the Internet. Why would you? This is just dumb.  Bottom-line: If you are not sure, don’t do it. Do’s and Don’ts for Private Networks
  • 13.
  • 14.  Review:  Personal Internet Security System doesn’t exist!  Password Etiquette  Private Network Security  Use WPA2 Only!  Google Hacking