Attacking Passwords Richard Frovarp About Me Senior Software - - PowerPoint PPT Presentation

attacking passwords
SMART_READER_LITE
LIVE PREVIEW

Attacking Passwords Richard Frovarp About Me Senior Software - - PowerPoint PPT Presentation

Attacking Passwords Richard Frovarp About Me Senior Software Engineer - Enterprise Computing & Infrastructure - NDSU Systems Administrator - EduTech Dabbler in Enterprise Wireless Member Apache Software Foundation 2 Standard Disclaimer


slide-1
SLIDE 1

Attacking Passwords

Richard Frovarp

slide-2
SLIDE 2

About Me

Senior Software Engineer - Enterprise Computing & Infrastructure - NDSU Systems Administrator - EduTech Dabbler in Enterprise Wireless Member Apache Software Foundation

2

slide-3
SLIDE 3

Standard Disclaimer

The presentation represents the personal views

  • f the presenter and not of North Dakota State
  • University. Always consult a security specialist

when making security decisions.

3

slide-4
SLIDE 4

Overview

  • Introduction to passwords
  • Storage methods
  • User tendencies
  • Attack methods
  • Mitigation?

4

slide-5
SLIDE 5

History

1979 Bob Morris & Ken Thompson

  • Hard terminals
  • Limited resources

○ attacker didn’t have

  • wn resources
  • Power Users ~3

Systems

"TTY33ASR" by Marcin Wichary, User:AlanM1 - Derived (cropped)

  • from. Licensed under CC BY 2.0 via Wikimedia Commons - http:

//commons.wikimedia.org/wiki/File:TTY33ASR.jpg#/media/File: TTY33ASR.jpg

5

slide-6
SLIDE 6

Advice

  • Don’t store passwords plain text
  • Don’t write down passwords
  • Computation should take about a second

6

slide-7
SLIDE 7

Methods of storing

  • Plain text
  • Encryption

○ Two way operation, must be able to decrypt ○ ECB makes things very bad

  • Hashing

○ One way transformation ○ Generally fast ○ Fixed length output ○ Abused in many contexts

7

slide-8
SLIDE 8

Rules

  • Minimum length 8 - From 1979
  • Max length - WHY?

8

slide-9
SLIDE 9

Password Patterns

  • Familiar with dumps

○ Consumer facing sites

  • Corporate looks different
  • Rotation

○ Seasons / Months

■ Winter14 ■ Winter15 ■ Spring15 ■ February15 ■ March15.

9

slide-10
SLIDE 10

Local Name Services

  • Can purchase list of local names online

○ Vikings ○ Agassiz ○ Force ○ Bison ○ Carl Ben Eilson ○ Roger Maris ○ Westport Beach

  • If known to have several employees from

Mumbai, get that one too.

10

slide-11
SLIDE 11

Mobile Keyboards

iOS 7 vs Android 4.2

http://www.phonearena.com/news/iOS-7-how-does-it-stack-up-against- Android_id44023

11

slide-12
SLIDE 12

Effects of rules

  • Common Requirements for “strong”

password

○ 8 characters - 3 character classes ○ [A-Z][a-z]{6}[0-9\.,!] ○ 26 ^ 7 * 13 = 104 billion

  • Not nearly strong enough

12

slide-13
SLIDE 13

Change

  • UNC Chapel Hill - 2010 Zhang

○ 41% prediction overall ○ 17% in 5 or fewer guesses

  • If site enforces history, attacker can get

history

13

slide-14
SLIDE 14

Methods of collecting

  • Chocolate - 2008 London

○ Men 10%, Women 45% ○ No verification

  • Phishing - 2014 Google

○ Worst 3% ○ Best 45%

14

slide-15
SLIDE 15

How bad?

  • 20% decoy accounts within 30 minutes
  • 50% within 20 hours
  • Compare to 30 / 90 day rotation policy?
  • Compare to UNC Chapel Hill study

15

slide-16
SLIDE 16

Online Brute Force

  • Not likely

○ Although common for admin / admin, root / password, etc ○ Vendors don’t like passwords being changed

  • Defenses don’t always get it right

○ DoS ○ Makes it difficult to respond ○ Which user has a password of “Password1”?

16

slide-17
SLIDE 17

Recovery

  • Password recovery options aren’t good

○ Mother’s maiden name dates from at least 1882 ○ Easily guessable

  • Email password is even worse
  • Recovery is costly

○ Customer will go to a competitor if company makes it difficult

  • SMS - not encrypted, but different channel

17

slide-18
SLIDE 18

Offline brute force

  • clHashcat - hashcat.net
  • ATi 290x ~ $300

○ MD5 10 billion ○ SHA1 3.4 billion ○ bcrypt 4.5 thousand ○ LM 428 million ○ NTLM 17 billion ○ Oracle 10g 480 million ○ Oracle 11g 3.3 billion

18

slide-19
SLIDE 19

Linux

  • md5crypt

○ No longer advised ○ MD5Crypt 3.3 million vs 10 billion MD5

  • sha512crypt

○ Current method - $6$ ○ Upgraded systems probably still using md5crypt ○ SHA512Crypt 10 thousand vs 99 million SHA512

19

slide-20
SLIDE 20

OS X

  • PBKDF2

○ Requires tuning ○ Apple’s tuning is quite good

  • OS 10.6 2.3 billion
  • OS 10.7 92 million
  • OS 10.8 696

20

slide-21
SLIDE 21

Windows

  • LM Hash

○ Not case sensitive ○ 14 character maximum ○ Two 7 character DES’s ○ No salt

  • NT Hash - md4 - unsalted

○ Yes, that md4 - 1990 ○ 20 billion per second

21

slide-22
SLIDE 22

Password Hashing Competition

  • Normal hashes don’t cut it
  • Use password hashing

○ PBKDF2 requires tuning ○ bcrypt requires tuning ○ scrypt requires tuning across memory usage

  • New competition

22

slide-23
SLIDE 23

Attacking Kerberos

  • Without pre-auth

○ Brute force initial request

  • With pre-auth

○ MitM pre-auth, then brute force ○ etype 23 15 million

  • Ticket

○ Pull TGT off of file system

  • Golden ticket
  • Plain text from memory

23

slide-24
SLIDE 24

Pass the hash

  • Windows hash acts as password

○ Reported as early as 1997

  • Target attack
  • Sets up Golden Ticket

24

slide-25
SLIDE 25

Mimikatz

  • Windows tries to be helpful

○ Of course your work computer needs to authenticate to XBOX Live

  • Black Hat USA 2014 - Windows: Abusing

Microsoft Kerberos - Sorry You Guys Don’t Get It

○ https://www.youtube.com/watch?v=-IMrNGPZTl0

25

slide-26
SLIDE 26

Golden Ticket

  • Generated from AD DS
  • Typically krbtgt user is not reset during a

reset

  • Can be valid for 10 years

○ Used to regain access after detection

  • Can set anything

○ Kerberos TGT is client provided and trusted - for 20 minutes

26

slide-27
SLIDE 27

WPA2 - Personal

  • Rainbow tables
  • Based off of SSID
  • 163 thousand

27

slide-28
SLIDE 28

Pineapple

28

slide-29
SLIDE 29

WPA2 - Enterprise

  • MSChapv2

○ Why oh why?

  • Pineappleable
  • MSChapv2 also shows up in VPN
  • CloudCracker.com

○ 300 million words, 20 minutes, $17

  • EAP - TLS

○ Use it

29

slide-30
SLIDE 30

OAuth

  • Password equivalent

○ Usually limited usage, but can still be scary

  • Service A reads status from Service B

triggering action on Service C.

  • Service B could be one to track family

member phones

  • Service C could lock and unlock your front

door

30

slide-31
SLIDE 31

Mitigation?

  • Actual two factor
  • Password managers
  • Long passwords
  • Don’t lose the domain

○ Disable NLTM, NTLMv2 ○ Hope Microsoft fixes issues eventually

  • Don’t use hashing primitives

○ Use PBKDF2, scrypt, bcrypt

31

slide-32
SLIDE 32

Questions?

32