Password Cracking;
Password Cracking attacks are of following types:
1. Passive online Cracking:In the passive online cracking, attacker tries to authenticate into system by cracking the passwords using Bruteforce, dictionary attacks or rainbow tables. This method is quite complex and time consuming. Also there is no surety of getting the password cracked. or rainbow tables. This method is quite complex and time consuming. Also there is no surety of getting the password cracked.
2. Active online Cracking:
In active online cracking, attacker generally guesses the passwords in order to gain access into the system. Generally, bad passwords and open authentication points are vulnerable to active online cracking. Although it consumes a lot of time and is less efficient way.
In offline attacks, attacker tries to exploit Lan manager hash (LM Hash), LM hashes are much vulnerable because of the short length and short key they use. Offline attacks are also take much time to crack the passwords. Generally in offline attacks, attacker performs dictionary, hybrid or brute force attacks.
Default password databases:
there are many website which contains databases of default usernames,
passwords, ports and various information of networking or other
devices. Sometimes, default password provides the access into target system. From the attacker's point of view each and every possibility should be covered.
Some of the website which contains default password databases are:
2. cirt.net/passwords
Manual Password Cracking:
- ping the target network to check whether it is live or not ultimately choose a valid target.
- Make a list of all possible passwords (easily available online)
- Define the priority of each password on the basis of the key defined
- Try to get access using password, in case of failure, again try with different password.
Automated Password Cracking:
Automated password cracking uses algorithms to crack passwords. Automated password cracking provides attacker an ease and is quite faster than manual password cracking.A. Dictionary Attack:
- In the dictionary attack, firstly the encryption algorithm used is found.
- The encrypted password is than obtained.
- From the lists of passwords, each password is encrypted using the same encryption algorithm and matched with original encrypted password (obtained in step 2).
- It matches each encrypted password with original encrypted password, until the match is found.
- If match is found, it show the password, else the procedure is repeated again.
B. Lan Manager Hash:
LM Hash is a algorithm by which the passwords are encrypted.
Algorithm of LM HASH:
- Suppose the password created is 234567xyzabcd.
- Firstly, all the characters are converted into uppercase letters, i.e. 234567XYZABCD.
- If the password is less than 14 characters in length, null is added until the length of 14.
- Now the password is split into half, i.e. 234567X and YZABCD
- Each half is separately encrypted and the result is concatenated.
- Now to crack the alpha-numeric part (first half), it take more than 20hours. Whereas it takes less than 5 minutes to crack the alphabetic part (second half).
C. Salting;
0 Comments
Please don't enter any spam link in the comment box.