All About Password - Catatan Hasdi Putra

advertisement
ET4085ET5085 Keamanan Jaringan Telekomunikasi
ET4085/ET5085 Telecommunication Network Security
All About Password
TUTUN JUHANA
T E L E C O M M U N I C AT I O N E N G I N E E R I N G
S C H O O L O F E L E C T R I C A L E N G I N E E R I N G & I N F O R M AT I C S
I N S T I T U T T E K N O LO G I B A N D U N G
http://telecommunication.itb.ac.id/~tutun/ET 4085
2
http://wp.me/P29YQz-k
Password Vulnerabilities
3
 Organizational or end-user vulnerabilities
Lack of password awareness on the part of end users
 Lack of password policies that are enforced within the
organization

 Technical vulnerabilities
 Weak encryption methods
 Insecure storage of passwords on computer systems
http://wp.me/P29YQz-k
Organizational password vulnerabilities
4
 User’s password usually:
 Weak and easy to guess.
 Jarang
diganti
 Digunakan untuk beberapa macam sistem
 Menuliskannya di tempat yang tidak aman
Password yang susah ditebak pun bisa dicuri
http://wp.me/P29YQz-k
Technical password vulnerabilities
5
 Weak password-encryption schemes
 Software that stores passwords in memory and easily
accessed databases.
 End-user applications that display passwords on the
screen while typing
 ICAT Metabase (an index of computer vulnerabilities)
currently identifies more than 460 technical password
vulnerabilities(icat.nist.gov/icat.cfm)
http://wp.me/P29YQz-k
Cracking Passwords
6
T H E O L D - FA S H I O N E D WAY
http://wp.me/P29YQz-k
Shoulder Surfing
7
http://wp.me/P29YQz-k
Inference
8
 Guessing passwords from information you
know about users - such as their date of
birth, favorite television show, and phone
numbers
http://wp.me/P29YQz-k
9
http://wp.me/P29YQz-k
Weak authentication
10
 Like in the old Windows 9x and Me
http://wp.me/P29YQz-k
Social Engineering
11
 Examples
 False support personnel claim that they need
to install a patch or new version of software on
a user’s computer,
talk the user into downloading the software
and obtain remote control of the system.
http://wp.me/P29YQz-k
12
 False vendors claim to need to make updates
to the organization’s accounting package or
phone system,
ask for the administrator password,
and obtain full access.
http://wp.me/P29YQz-k
 False contest
Web sites run by hackers gather user IDs and
passwords of unsuspecting contestants.
The hackers then try those passwords on other Web
sites, such as Yahoo! and Amazon.com, and steal
personal or corporate information
http://wp.me/P29YQz-k
13
14
 False employees notify the security desk that they
have lost their keys to the computer room, are given a
set of keys, and obtain unauthorized access to physical
and electronic information
http://wp.me/P29YQz-k
Performing
Social-Engineering Attacks
15
1.
2.
3.
4.
Perform research
Build trust
Exploit relationship for information through words,
actions, or technology
Use the information gathered for malicious purposes.
http://wp.me/P29YQz-k
Fishing for information
16
 Social engineers typically start by
gathering public information about
their victim
Using the Internet
Dumpster diving
http://wp.me/P29YQz-k
Building trust
17
 Likability
 Believability
http://wp.me/P29YQz-k
Exploiting the relationship
18
 Deceit through words and actions














Acting overly friendly or eager
Mentioning names of prominent people within the organization
Bragging about authority within the organization
Threatening reprimands if requests aren’t honored
Acting nervous when questioned (pursing the lips and fidgeting especially the hands and feet, because more conscious effort is required
to control body parts that are farther from the face)
Overemphasizing details
Physiological changes, such as dilated pupils or changes in voice pitch
Appearing rushed
Refusing to give information
Volunteering information and answering unasked questions
Knowing information that an outsider should not have
A known outsider using insider speech or slang
Asking strange questions
Misspelling words in written communications
http://wp.me/P29YQz-k
19
Deceit through technology
 Sending e-mail for critical
information
Such e-mail usually provides a link
that directs victims to a professionaland legitimate-looking Web site that
“updates” such account information as
user IDs, passwords, and Social
Security numbers
 Anytime you need to go to a website
for your bank, credit card companies
or other personal, financial or
confidential information; do not follow
a link in an email; just type their
address in your browser directly

http://wp.me/P29YQz-k
http://wp.me/P29YQz-k
20
21
 The Nigerian 419 e-mail fraud scheme attempts to
access unsuspecting people’s bank accounts and
money.
 These social engineers - scamsters - offer to
transfer millions of dollars to the victim to
repatriate a deceased client’s funds to the United
States
 All the victim must provide is personal bankaccount information and a little money up front to
cover the transfer expenses
 Victims have ended up having their bank accounts
emptied
http://wp.me/P29YQz-k
Social-Engineering Countermeasures
22
 Policies
 Classifying data
 Hiring employees and contractors and setting up
user IDs
 Terminating employees and contractors, and
removing user IDs
 Setting and resetting passwords
 Handling proprietary and confidential information
 Escorting guests
http://wp.me/P29YQz-k
23
 User awareness
 Treat security awareness and training as a business investment.
 Train users on an ongoing basis to keep security fresh in their
minds.
 Tailor your training content to your audience whenever possible.
 Create a social-engineering awareness program for your business
functions and user roles.
 Keep your messages as nontechnical as possible.
 Develop incentive programs for preventing and reporting incidents.
 Lead by example
http://wp.me/P29YQz-k
24
 Never divulge any information unless you can
validate that the person requesting the
information needs it and is who he says he is
 If a request is made over the telephone, verify the
caller’s identity, and call back.
 Never click an e-mail link that supposedly loads
a page with information that needs updating.
This is especially true for unsolicited e-mails.
http://wp.me/P29YQz-k
25
 Escort all guests within a building.
 Never send or open files from
strangers.
 Never give out passwords.
http://wp.me/P29YQz-k
26
 Never let a stranger connect to one of your
network jacks — even for a few seconds.
 A hacker can place a network analyzer, Trojan-horse
program, or other malware directly onto your
network.
 Classify your information assets, both
hard-copy and electronic. Train all
employees to handle each asset type.
http://wp.me/P29YQz-k
27
 Develop and enforce computer media and
document destruction policies that help ensure
data is handled carefully and stays where it
should.
 Use cross-shredding paper shredders.
 Never allow anonymous File Transfer Protocol
(FTP) access into your FTP servers if you don’t
have to.
http://wp.me/P29YQz-k
High-tech password cracking
28
PA S S W O R D C R A C K I N G S O F T WA R E
D I C T I O N A R Y AT TA C K S
B R U T E - F O R C E AT TA C K S
http://wp.me/P29YQz-k
Password cracking software
29
 NetBIOS Auditing Tool (NAT) specializes in network-based
password attacks. Go to www.securityfocus.com/tools/543
 Chknull (www.phreak.org/archives/exploits/novell) for Novell
NetWare password testing
 These tools require physical access on the tested computer:






John the Ripper (www.openwall.com/john)
pwdump2 (razor.bindview.com/tools/desc/pwdump2_readme.html)
Crack (coast.cs.purdue.edu/pub/tools/unix/pwdutils/crack)
Brutus (www.hoobie.net/brutus)
Pandora (www.nmrc.org/project/pandora)
NTFSDOS Professional (www.winternals.com)
 Cain and Abel for capturing, cracking, and even calculating
various types of passwords on a plethora of systems
(www.oxid.it/cain.html)
http://wp.me/P29YQz-k
Dictionary attacks
30
 Dictionary Attack dilakukan dengan cara
membandingkan password dengan suatu dictionary
 Password Crackers akan mencoba setiap kata yang ada
di dalam dictionary sebagai password
 Suatu dictionary (biasa disebut juga sebagai word list)
yang baik lebih daripada sekedar kamus

Contoh: di dalam kamus pasti tidak ada kata-kata "qwerty"
tapi di dalam word list yang baik, “qwerty” pasti akan
dimasukkan
 Beberapa contoh wordlist dapat diperoleh di:
 packetstormsecurity.nl/Crackers/wordlists
 www.outpost9.com/files/WordLists.html
http://wp.me/P29YQz-k
Brute-force attacks
31
 Brute-force attacks try every combination
of numbers, letters, and special characters
until the password is discovered
http://wp.me/P29YQz-k
General password-hacking countermeasures
32
 Instruct users to create different passwords for
different systems, especially on the systems
that protect more sensitive information
 Strong passwords are important, but balance
security and convenience:
 You can’t expect users to memorize passwords
that
are insanely complex and changed every week.
 You can’t afford weak passwords or no passwords at
all.
http://wp.me/P29YQz-k
John the Ripper password cracker
33
H T T P : / / W W W.O P E N WA L L . C O M / J O H N / F / J O H N 17 1 W. Z I P
http://wp.me/P29YQz-k
Storing passwords
34
 If you have to choose between weak
passwords that your users can memorize
and strong passwords that your users
must write down, please choose having
readers write down passwords and store
the information securely.
http://wp.me/P29YQz-k
35
 Train users to store their written passwords in a
secure place - not on keyboards or in easily cracked
password-protected computer files (such as
spreadsheets)
http://wp.me/P29YQz-k
36
 Users should store a written password
in either of these locations:
 A locked file cabinet or office safe
 An encrypted file or database, using such tools
as
PGP
Open-source Password Safe, originally developed
by Counterpane (passwordsafe.sourceforge.net)
http://wp.me/P29YQz-k
37
 You can store your password using
Password Safe
(http://passwordsafe.sourceforge.net/)
 It’s free!!
http://wp.me/P29YQz-k
Policy considerations
38
 Enforce (or encourage the use of) a strong
password-creation policy:
Use upper- and lowercase letters, special characters, and
numbers. (Never use only numbers. These passwords can
be cracked quickly.)
 Misspell words or create acronyms from a quote or a
sentence.
 Use punctuation characters to separate words or acronyms.
 Change passwords every 6 to 12 months.
 Use different passwords for each system

http://wp.me/P29YQz-k
39
Use variable-length passwords
Don’t use common slang words or words
that are in a dictionary.
Don’t use similar-looking characters,
such as 3 instead of E, 5 instead of S, or !
instead of 1.
Password-cracking programs can check
for this.
http://wp.me/P29YQz-k
40
 Don’t reuse the same
password within 12 months.
 Use password-protected screen savers.
 Don’t share passwords.
 Avoid storing user passwords in a central place, such
as an unsecured spreadsheet on a hard drive.
This is an invitation for disaster.
Use PGP, Password Safe, or a similar program to store
user passwords.
http://wp.me/P29YQz-k
Other considerations
41
 Test your applications to make sure they aren’t
storing passwords in memory or writing them to
disk.
 Some password-cracking Trojan-horse applications
are transmitted through worms or simple e-mail
attachments, such as VBS.Network.B and
PWSteal.SoapSpy. These applications can be lethal
to your passwordprotection mechanisms if they’re
installed on your systems.
 The best defense is malware protection software,
such as antivirus protection
http://wp.me/P29YQz-k
42
 Keep your systems patched.
 Passwords are reset or compromised during buffer
overflows or other DoS conditions.
 Know your user IDs
 If an account has never been used, delete or disable
the account until it’s needed
 As the security administrator in your
organization, you can enable account lockout to
prevent password-cracking attempts.
http://wp.me/P29YQz-k
Other ways to crack passwords
43
 Keystroke logging
 The use of software or hardware to record keystrokes
as they’re being typed into the computer.
 Logging tools example: Actual Spy
(http://www.actualkeylogger.com/download-freekey-logger.html)
 Hardware-based tools fit between the keyboard and
the computer or replace the keyboard altogether
http://wp.me/P29YQz-k
http://wp.me/P29YQz-k
44
Hardware Keylogger
http://wp.me/P29YQz-k
45
46
 Homemade hardware keylogger:
http://www.keelog.com/diy.html
http://wp.me/P29YQz-k
47
 Countermeasures
 The best defense against the installation of keystroke-logging
software on your systems is a spyware-detection program or
popular antivirus products.
 Consider locking down your desktops by setting the
appropriate user rights through local or group security policy
in Windows
 Alternatively, you could use a commercial lock-down
program, such as Fortres 101 (www.fortres.com) for Windows
or Deep Freeze (www.deepfreezeusa.com) for Windows and
Mac OS X.
http://wp.me/P29YQz-k
48
http://wp.me/P29YQz-k
Credit Card Skimmer
49
SKIMMING IS THE THEFT OF CREDIT CARD
I N F O R M AT I O N U S E D I N A N O T H E R W I S E L E G I T I M AT E
TRANSACTION
http://wp.me/P29YQz-k
http://telecommunication.itb.ac.id/~tutun/ET4085
First trick
50
 A credit card “skimmer” is mounted to the front of the normal ATM card slot which
reads the ATM card number and either stores or transmits the number to the
scammers.
 Once in place it’s very difficult to tell that a skimmer is attached to the ATM machine.
 Any cards used in this machine will have their magnetic strip recorded and the
scammers will be able to use this information to create a “clone” of this card using a
magnetic strip writer
http://www.expandmywealth.com/category/credit-cards/
http://wp.me/P29YQz-k
http://telecommunication.itb.ac.id/~tutun/ET4085
51
 The scammers can take things even further and install a
pamplet box containing a concealed camera to record
the user’s PIN number
http://www.expandmywealth.com/category/credit-cards/
http://wp.me/P29YQz-k
http://telecommunication.itb.ac.id/~tutun/ET4085
The Lebanese Loop Trick
52
the cut






The Lebanese Loop consist of a strip or sleeve of metal or plastic (such as x-ray film or VCR tape) that is
inserted into the ATM’s card slot
The ends of the strip are folded upwards.
The foldered ends are glued to the outer surface of the ATM card slot, making the Lebanese Loop
virtually impossible to detect
Slits are cut on both sides of the Lebanese Loop to prevent the card from being returned at the end of
the transaction. This causes the card to remain in the machine.
Once the ATM user leaves the scammer can now return to the machine and pull down the ends of the
loop to retrieve the ATM card and remove it from the slot.
The scammer now has the ATM card and is free to use it provided he was able to record or view the
user entering in their PIN number
http://www.expandmywealth.com/category/credit-cards/
http://wp.me/P29YQz-k
Download