[EAS] Password Cracking Basics
David Turnmire
eassbelist at cableone.net
Thu Feb 14 22:56:03 CST 2013
Any form of brute force determining of passwords takes a finite amount
of time. The trick is not giving the bad guys enough time. They have
various tricks to speed things up. You can slow them down with complex
or long passwords. But as has been mentioned, the computer is only
going to respond so fast to over the net login attempts. By my math, a
modestly good password can deal with that approach. And a lockout
mechanism can kill it dead.
The other avenue for the bad guy, as has been mentioned, is to look at
vulnerabilities of the software itself and do an end-run around needing
to know the password. The fewer opportunities you present, the fewer
chances they have of finding that vulnerability. Which is why security
folks recommend closing down any IP ports that you don't actually need,
since each is associated with its own software.
It bares mentioning that you can't assume the attack on a given machine
will come from outside. It only takes one employee doing any number of
things that result in ONE computer getting infected or penetrated for
that computer to be used to attack others on the same network. The
nature of computers are such that the file on them with all of the
passwords HAS to be freely readable by ANY authorized user of that
computer. Or anyone with physical access for that matter. The
individual passwords INSIDE that file are encrypted, but the file itself
is free for the taking. So...if the bad guy gets any kind of access to
that computer (physical or via net), they have access to the password
file. Which has ALL passwords for ALL the accounts on that computer.
So... hacker takes that file with him and can now decrypt it at his
leisure on his own computer. The tools to do this are readily available
on the net for free. Gets even scarier for the larger businesses that
have something called a "domain controller", where one file on one
computer has ALL the companies passwords! And all it takes to get
access to THAT computer's password file is for an Administrator to use
his "domain administrator" account to access one of the standard office
computers, thus leaving THAT password available to anyone with access to
that office computer. I personally ran a "password audit" a while back
(pre-Vista, when things got a bit tougher) using one such readily
available programs on just such a file. Many companies with IT staff do
this periodically. Within 30 minutes over 90% of our staff's passwords
were cracked using a mediocre office computer. Several were cracked
within the first minute. Letting it run overnight resulted in 97% of
the users being cracked. The ones that weren't hacked within a day had
passwords beyond the oft cited 8 characters.
The moral to that story is EVERYONE's password at a company and
EVERYONE's "safe computing practices" matters. As does a layered
approach to security (installing those security patches, anti-virus
software, good passwords, etc). In some regards the EAS boxes can be
made MORE secure than your office network. If all network access EXCEPT
the web interface is disabled, then you have restricted the hacker to
guessing the password (fixed by decent passwords... at least if they
aren't shared with your office computer!), and the vulnerability of the
web software and perhaps some one or two other software packages on the
box. Which brings me to one of the other issues on my earlier "wish
list". Vendors that have a plan for keeping the OS updated (including
web server software) with security patches rather than just "their code".
Dave
More information about the EAS
mailing list