Bruteforce basic presentation_file - linx
Upcoming SlideShare
Loading in...5
×
 

Bruteforce basic presentation_file - linx

on

  • 744 views

 

Statistics

Views

Total Views
744
Slideshare-icon Views on SlideShare
744
Embed Views
0

Actions

Likes
0
Downloads
54
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Bruteforce basic presentation_file - linx Bruteforce basic presentation_file - linx Presentation Transcript

    • BRUTE FORCE, DICTIONARY ATTACK, AND THE IMPLEMENTATION Linggar Primahastoko IDSECCONF 2011
    • BACKGROUND
      • Public Information
      • Sensitive
      • Secured System
    • WHY ?
      • SQL INJECTION X
      • REMOTE FILE INCLUSION X
      • DIRECT URL ACCESS X
      • … . X
      • … . X
      • DICTIONARY ATTACK ?
      • BRUTE FORCE ?
    • BRUTE FORCE
      • TRY THE VARIETY KEYS
    • BRUTE FORCE
      • LIMITING THE BRUTE FORCE
    • DICTIONARY ATTACK
      • TRY THE POSSIBLE KEYS
    • DICTIONARY ATTACK
    • Implementation
      • Looking for the wrong sign
      • Check that there are no wrong sign if it's true
      • Make the automation
    • system keys attacker 1. Looking for the wrong sign 2. Get the key one by one 3. Try the key 4. if there is a wrong sign,back to second step 5. if there is no wrong sign, save the key and exit
    • The Enemies
      • Connection
      • Firewall
      • Captcha
      • Limit Login Attempt
      • Time
    • Conclusions
      • Simple way to make a simple brute force attack
      • Need more additional way to secure the system
      • No system that 100% secure
      • THANK YOU