here - cvhsportal

advertisement
Security E: Hands on!
Compelling question: Do passwords really matter?
Notice: All but one of the tools covered today is open source or freeware.
1) Sniffing:
Read "A guide to sniffing out passwords and cookies" (and how to protect yourself against it) -- ASK
QUESTIONS if there are terms and/or concepts you don't understand. (Note: Wireshark is commonly
used)
-- Consider the disclaimer "to help find lost passwords and allow for penetration testing": A penetration
test, occasionally pentest, is a method of evaluating computer and network security by simulating an
attack on a computer system or network from external and internal threats. (Wikipedia)
Website Examples: Password Sniffer & Facebook Dump
2) Keylogger:
Sample Video of "Elite Keylogger"
Question: Why would antivirus software detect any such program as a threat?
3) "Brute Force" Attacks
In cryptography, a brute-force attack, or exhaustive key search, is a cryptanalytic attack that can, in
theory, be used against any encrypted data[1] (except for data encrypted in an information-theoretically
secure manner). Such an attack might be utilized when it is not possible to take advantage of other
weaknesses in an encryption system (if any exist) that would make the task easier. It consists of
systematically checking all possible keys or passwords until the correct one is found. In the worst case,
this would involve traversing the entire search space.
When password guessing, this method is very fast when used to check all short passwords, but for
longer passwords other methods such as the dictionary attack are used because of the time a bruteforce search takes. (Wikipedia)
A dictionary attack uses a targeted technique of successively trying all the words in an exhaustive list
called a dictionary (from a pre-arranged list of values).[1] In contrast with a brute force attack, where a
large proportion key space is searched systematically, a dictionary attack tries only those possibilities
which are most likely to succeed, typically derived from a list of words for example a dictionary (hence
the phrase dictionary attack). Generally, dictionary attacks succeed because many people have a
tendency to choose passwords which are short (7 characters or fewer), such as single words found in
dictionaries or simple, easily predicted variations on words, such as appending a digit. However these
are easy to defeat. Adding a single random character in the middle can make dictionary attacks
untenable. Unlike Brute-force attacks, Dictionary attacks are not guaranteed to succeed.
Tools galore (fuer alle Idioten): a) sample video b) YourtubeBRUTEFORCE.pdf and Crackstation.pdf
(dictionaries)
4) Password Manager:
a) Last Password video b) Keepass video (Techzilla)
TRY IT!!
Install both and compare and contrast.
End of section "walk away" awareness: Cleaning up our trail, knowing how to keep our browsing and
other Internet-related sessions secure (Incognito, Fog, VPN), AND how to manage SECURE passwords
are skills you should value at home AND in the workplace (with which you too will be all the more
valued).
Download