Anda di halaman 1dari 10

Ethical Hacking

Steve Bolt

PHASES OF AN ATTACK
PHASE 4: PASSWORD ATTACKS

PHASES OF AN ATTACK
PHASE 4: PASSWORD ATTACKS

PASSWORD ATTACKS
Why attack passwords?
Main form of user authentication
Continues to prove the point
Helps organizations with account management
Old accounts that need to be removed
Hard coded pws that run the network

PASSWORD ATTACKS
Two types of pw attacks
Guessing
Cracking

Pluses and minuses to each


Some alert the target
Others have less of a footprint

PASSWORD ATTACKS
Need a wordlist
Custom dictionaries need to be built
Can start with freely available online
Once you have your wordlist
Make sure it contains unique values
Cat wordlist.txt | sort | uniq > dictionary.txt
Thank you SANS

PASSWORD ATTACKS
Generating a dictionary
Free online tools

Can crawl a target page to get a unique list of words


Biographical dictionary geenration

Once you have cracked pws.


Make sure you protect the data

PASSWORD ATTACKS
Cautions
Guessing
Could get locked out

Cracking
Could alert IDS when you extract the files

PASSWORD ATTACKS
LAB TIME......

PASSWORD CRACKING
THC Hydra
CAIN
John the Ripper
Mimikatz
WCE
Rainbow tables

PASSWORD CRACKING
Any Questions?

Anda mungkin juga menyukai