Yvan Cartwright, Web Security Introduction Correct encryption use Guide to passwords Dictionary hacking Brute-force hacking.

Slides:



Advertisements
Similar presentations
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Advertisements

Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Understand Database Security Concepts
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Introduction The concept of “SQL Injection”
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Apr 4, 2003Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Internet Security In the 21st Century Presented by Daniel Mills.
Cyber Patriot Training
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
CIS 450 – Network Security Chapter 8 – Password Security.
M1G Introduction to Database Development 6. Building Applications.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
EMerge Browser Managed Security Platform Module 3: Startup eMerge Certification Course  Physical connection  TCP/IP Characteristics of PC  Initial connection.
Password Security Everything (well… a lot, anyway) you didn’t know, or want to, but really actually need to.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
User Access to Router Securing Access.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Chapter 8 Configuring and Managing Shared Folder Security.
INTERNET SAFETY FOR KIDS
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Copyright © 2006, Infinite Campus, Inc. All rights reserved. User Security Administration.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Users and Documents.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Confidentiality, Integrity, Awareness What Does It Mean To You.
Windows Administration How to protect your computer.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Computer Security Sample security policy Dr Alexei Vernitski.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Proctor Caching and System Check September 4, 2014 Becky Hoeft Conference Number: (877) Conference Pin:
Understanding Security Policies Lesson 3. Objectives.
COMPUTER NETWORKS Quizzes 5% First practical exam 5% Final practical exam 10% LANGUAGE.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
7 Tips To Improve Your Website Security. Introduction Use of Content management systems like WordPress, Joomla & Drupal, utilization of various tools,
Defense In Depth: Minimizing the Risk of SQL Injection
Data and database administration
Common Methods Used to Commit Computer Crimes
Microsoft SharePoint Server 2016
Chapter 2: Basic Switching Concepts and Configuration
Security.
Ways to Secure CMS Websites. The most widely used Content Management Systems are Wordpress, Joomla and Drupal as per statistics. The highest CMS platforms.
Unit 27: Network Operating Systems
Web Servers / Deployment
Chapter 3: Protecting Your Data and Privacy
REDCap and Data Governance
Security.
Operating System Hardening
Protocol Application TCP/IP Layer Model
Test 3 review FTP & Cybersecurity
Convergence IT Services Pvt. Ltd
G061 - Network Security.
HC VMware Module
Presentation transcript:

Yvan Cartwright, Web Security Introduction Correct encryption use Guide to passwords Dictionary hacking Brute-force hacking Securing systems

Yvan Cartwright, Web Security Ensuring optimum encryption Depending on how your server is configured you may have several encryption possibilities. Standard routines include: –Standard DES (2 character salt) –Extended DES(9 character salt starting with _) –MD5 (12 character salt starting with $1$) –Blowfish(16 character salt starting with $2$) Think of the salt as an indicator of password randomness. Bigger salt = harder to hack.

Yvan Cartwright, Web Security Using different routines in PHP How can we check using PHP which encryption routines are available? Simple. The server will set one or more of the following variables to 1 if it is available: –CRYPT_STD_DES –CRYPT_EXT_DES –CRYPT_MD5 –CRYPT_BLOWFISH

Yvan Cartwright, Web Security Generating encrypted passwords In order to encrypt a password we can use the crypt() function in PHP. Without specifying a salt, PHP will default to Standard DES. We can easily create our own PHP function that will generate a random salt of any desired length.

<?php function makeSalt($salt_length) {$salt = ""; for($char = 0; $char < $salt_length; $char++) {$salt = $salt. chr(rand(40,126)); } return $salt; } ?> By placing the code above on our page, we can simply call it and send it the length of salt we want it to create. The call to rand() gives us characters including numbers, letters and most special characters.

$user = $_POST['myusername']; $pass = $_POST['mypassword']; if (CRYPT_STD_DES == 1) { $salt = makeSalt(2); echo(" Standard DES salt: ". $salt); $standard_des_pass = crypt($pass, $salt); } if (CRYPT_EXT_DES == 1) { $salt = "_". makeSalt(8); echo(" Extended DES salt: ". $salt); $extended_des_pass = crypt($pass, $salt); }

if (CRYPT_MD5 == 1) { $salt = makeSalt(8); $salt = substr($user, 0, 8). substr($salt, -(8-strlen($user))); $salt = "$1$". $salt. "$"; echo(" MD5 salt: ". $salt); $user_salted_pass = crypt($pass, $salt); } if (CRYPT_BLOWFISH == 1) { $salt = makeSalt(12); $salt = substr($user, 0, 12). substr($salt, -(12- strlen($user))); $salt = "$2$". $salt. "$"; echo(" Blowfish salt: ". $salt); $user_salted_pass = crypt($pass, $salt); }

Yvan Cartwright, Web Security Good passwords A good rule of thumb is that the more characters an encryption routine generates, the harder it is to break. However, this rule is useless if the password –is too short (less than 8 characters) –is a word that can be found in a dictionary –does not contain any numbers or special characters

Yvan Cartwright, Web Security Encryption in action Password = rasmuslerdorf Standard DES: l.3StKT.4T8M Extended DES: _J9..rasmBYk8r9AiWNc MD5: $1$rasmusle$rISCgZzpwk3UhDidwXvin0 Blowfish: $2a$07$rasmuslerd nIdrcHdxcUxWomQX9j6kvERCFjTg7Ra So, how do we go about cracking these passwords? A good first approach is to do a dictionary hack...

Yvan Cartwright, Web Security Dictionary hacking The process of dictionary hacking is as follows: 1.Get the next word in the dictionary. 2.Encrypt it using the same salt as the next user. 3.Is the encrypted dictionary word the same as the user’s encrypted password? If yes then we’ve hacked their password! 4.If not and we have other users then goto 2. 5.Else if we have other dictionary words goto 1. 6.Else the password wasn’t one of the words in our dictionary. Creating a program that performs this task is easy...

Yvan Cartwright, Web Security Making it difficult for the hackers So, as far as hacking is concerned, provided that we don’t use a dictionary word as our password we’re safe yes? No... A non-dictionary password means that we have to do a brute-force approach. This means that we have to go through every possible combination of possible passwords until we find a match.

Yvan Cartwright, Web Security Brute-force hacking Brute-force hacking can take a long time! If the characters we can use to make a password consist of all letters and numbers (a total of 62 characters in total) then we can easily deduce how many ‘keys’ we have to check. 4 characters = 62 4 = keys 6 characters = 62 6 = keys 8 characters = 62 8 = keys

Yvan Cartwright, Web Security Brute-force hacking With the processing speeds of modern PCs, even this number of keys is crackable. Even if you make the passwords longer then it is possible using clusters of PCs spread across the globe and using the Internet to break the task down into more manageable chunks. However, using the same encryption strength as most modern browsers, it could take hundreds to thousands of years to break a decent password.

Yvan Cartwright, Web Security Uncrackable passwords For speed reasons, most hacking programs only use a subset of characters in their brute-force key generators. The following table contains a list of special characters that are not used. Using any of these characters in your own passwords should render them uncrackable! Note: in order to use these characters you need to press the ALT key followed by the combination given using the numeric keypad.

Yvan Cartwright, Web Security Feet of clay A security system is only as good as its weakest component. There are several steps that a systems administrator must go through to make a hackers job harder. Most of these are easy to accomplish although the specific details are not given here as this would be a module in its own right. Briefly, the steps are:

Yvan Cartwright, Web Security Securing systems Ensure that the operating system is up to date and contains the latest security patches before connecting to the network. Do not upgrade to a new operating system until it has been tested over the course of several months. Run a good anti-virus program and keep it up to date. Determine the role of any computer connected to the Internet and ensure that only those services required are permitted to run on it. Administrator passwords should be very strong.

Yvan Cartwright, Web Security Securing systems Only use the administrator account when necessary. Use different passwords for administrator or root and general user accounts. Force new users to change their passwords when they first login. Disable or delete old or unused accounts that belong to people who no longer need access. Disable Telnet and FTP. Use SSH instead. Drop any connection to a server if a login is failed 3 times (takes time to make a connection).

Yvan Cartwright, Web Security Securing systems Make sure to configure all installed software, disable all unused features and be sure to limit the availability of any features that are enabled. Install a software or hardware firewall to protect individual services. Restrict access to services to within the company’s IP addresses. Maintain good physical security. Do not run anonymous FTP on any server with sensitive or “not public” data. Make frequent backups of systems and data.