SlideShare a Scribd company logo
1 of 2
Download to read offline
3. Describe the five basic attacks on authentication systems.
4. Describe how password hashing works
a. Provide screenshots of using md5sum in your group VM under your account
5. Why can’t an attacker masquerade by using a hashed password?
6. Explain how biometric systems are vulnerable to the five generic attacks on authentication
systems.
a. Clone or borrow credential
b. Sniff credential
c. Trial and error guessing
d. Denial of service
e. Retrieve from backup
Solution
1) and 6)
1.Clone or borrow the credential or token - copy of the credential itself and uses it to log in.
2.Sniff the credential - intercepts and copies it while being transmitted to the login process.
3.Trial-and-error guessing - simply guess several words or names.
4.Denial of service - attack either damages the system or blocks access to it by others.
5.Retrieve from backup - find the authentication database or other information on a backup copy
of the hard drive
2)
Hashing is the transformation of a string of characters into a usually shorter fixed-length value
or key that represents the original string. Hashing is used to index and retrieve items in a
database because it is faster to find the item using the shorter hashed key than to find it using the
original value. It is also used in many encryption algorithms
>As a simple example of the using of hashing in databases, a group of people could be arranged
in a database like this:
Abernathy, Sara Epperdingle, Roscoe Moore, Wilfred Smith, David (and many more sorted into
alphabetical order)
>Each of these names would be the key in the database for that person's data. A database search
mechanism would first have to start looking character-by-character across the name for matches
until it found the match (or ruled the other entries out). But if each of the names were hashed, it
might be possible (depending on the number of names in the database) to generate a unique four-
digit key for each name
For example:
7864 Abernathy, Sara 9802 Epperdingle, Roscoe 1990 Moore, Wilfred 8822 Smith, David (and
so forth)
>A search for any name would first consist of computing the hash value (using the same hash
function used to store the item) and then comparing for a match using that value. It would, in
general, be much faster to find a match across four digits, each having only 10 possibilities, than
across an unpredictable value length where each character had 26 possibilities.
>The hashing algorithm is called the hash function-- probably the term is derived from the idea
that the resulting hash value can be thought of as a "mixed up" version of the represented value.

More Related Content

Similar to 3. Describe the five basic attacks on authentication systems.4. De.pdf

Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash functionMijanur Rahman Milon
 
Ethical hacking mind map
Ethical hacking mind mapEthical hacking mind map
Ethical hacking mind mapdasdwwe1
 
In responding to your peers’ posts, assess your peers’ recommendatio.docx
In responding to your peers’ posts, assess your peers’ recommendatio.docxIn responding to your peers’ posts, assess your peers’ recommendatio.docx
In responding to your peers’ posts, assess your peers’ recommendatio.docxmecklenburgstrelitzh
 
Implementation of rainbow tables to crack md5 codes
Implementation of rainbow tables to crack md5 codesImplementation of rainbow tables to crack md5 codes
Implementation of rainbow tables to crack md5 codesKhadidja BOUKREDIMI
 
Secure passwords-theory-and-practice
Secure passwords-theory-and-practiceSecure passwords-theory-and-practice
Secure passwords-theory-and-practiceAkash Mahajan
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms WorkCheapSSLsecurity
 
Merkle Trees and Fusion Trees
Merkle Trees and Fusion TreesMerkle Trees and Fusion Trees
Merkle Trees and Fusion TreesRohithND
 
SPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher TextSPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher TextIJMTST Journal
 
Comparative hash algorithm power point presentation
Comparative hash algorithm power point presentationComparative hash algorithm power point presentation
Comparative hash algorithm power point presentationHajaAjmeerdeen
 
3 searching algorithms in Java
3 searching algorithms in Java3 searching algorithms in Java
3 searching algorithms in JavaMahmoud Alfarra
 
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessReconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessLeon Teale
 

Similar to 3. Describe the five basic attacks on authentication systems.4. De.pdf (20)

Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
Ethical hacking mind map
Ethical hacking mind mapEthical hacking mind map
Ethical hacking mind map
 
Hashing
HashingHashing
Hashing
 
Js3616841689
Js3616841689Js3616841689
Js3616841689
 
Brute Forcing
Brute ForcingBrute Forcing
Brute Forcing
 
Brute force
Brute forceBrute force
Brute force
 
In responding to your peers’ posts, assess your peers’ recommendatio.docx
In responding to your peers’ posts, assess your peers’ recommendatio.docxIn responding to your peers’ posts, assess your peers’ recommendatio.docx
In responding to your peers’ posts, assess your peers’ recommendatio.docx
 
Implementation of rainbow tables to crack md5 codes
Implementation of rainbow tables to crack md5 codesImplementation of rainbow tables to crack md5 codes
Implementation of rainbow tables to crack md5 codes
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
 
Secure passwords-theory-and-practice
Secure passwords-theory-and-practiceSecure passwords-theory-and-practice
Secure passwords-theory-and-practice
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms Work
 
Merkle Trees and Fusion Trees
Merkle Trees and Fusion TreesMerkle Trees and Fusion Trees
Merkle Trees and Fusion Trees
 
Ch18
Ch18Ch18
Ch18
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Iam r31 a (2)
Iam r31 a (2)Iam r31 a (2)
Iam r31 a (2)
 
SPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher TextSPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher Text
 
Comparative hash algorithm power point presentation
Comparative hash algorithm power point presentationComparative hash algorithm power point presentation
Comparative hash algorithm power point presentation
 
3 searching algorithms in Java
3 searching algorithms in Java3 searching algorithms in Java
3 searching algorithms in Java
 
Stu r33 b (2)
Stu r33 b (2)Stu r33 b (2)
Stu r33 b (2)
 
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessReconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awareness
 

More from arkleatheray

briefly write about the Aridity of Subtropics Causes, locations, etc.pdf
briefly write about the Aridity of Subtropics Causes, locations, etc.pdfbriefly write about the Aridity of Subtropics Causes, locations, etc.pdf
briefly write about the Aridity of Subtropics Causes, locations, etc.pdfarkleatheray
 
Compare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdf
Compare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdfCompare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdf
Compare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdfarkleatheray
 
Determine whether the following statements about the accumulated eang.pdf
Determine whether the following statements about the accumulated eang.pdfDetermine whether the following statements about the accumulated eang.pdf
Determine whether the following statements about the accumulated eang.pdfarkleatheray
 
Discuss the changing demographics of Entrepreneurs and give an examp.pdf
Discuss the changing demographics of Entrepreneurs and give an examp.pdfDiscuss the changing demographics of Entrepreneurs and give an examp.pdf
Discuss the changing demographics of Entrepreneurs and give an examp.pdfarkleatheray
 
Data StructuresPlease I need help completing this c++ program..pdf
Data StructuresPlease I need help completing this c++ program..pdfData StructuresPlease I need help completing this c++ program..pdf
Data StructuresPlease I need help completing this c++ program..pdfarkleatheray
 
Create Student Project Database with insert, select, update, and del.pdf
Create Student Project Database with insert, select, update, and del.pdfCreate Student Project Database with insert, select, update, and del.pdf
Create Student Project Database with insert, select, update, and del.pdfarkleatheray
 
Before 1980, most cell control and management software was written b.pdf
Before 1980, most cell control and management software was written b.pdfBefore 1980, most cell control and management software was written b.pdf
Before 1980, most cell control and management software was written b.pdfarkleatheray
 
at age 51 can you take early distributions from traditional IRA for .pdf
at age 51 can you take early distributions from traditional IRA for .pdfat age 51 can you take early distributions from traditional IRA for .pdf
at age 51 can you take early distributions from traditional IRA for .pdfarkleatheray
 
What is a view What is it used for Give examples when a view can b.pdf
What is a view What is it used for Give examples when a view can b.pdfWhat is a view What is it used for Give examples when a view can b.pdf
What is a view What is it used for Give examples when a view can b.pdfarkleatheray
 
^^^Q3. I am trying to implement double linked list but I was faile.pdf
^^^Q3. I am trying to implement double linked list but I was faile.pdf^^^Q3. I am trying to implement double linked list but I was faile.pdf
^^^Q3. I am trying to implement double linked list but I was faile.pdfarkleatheray
 
What is the evolutionary basis for sexual reproductionSolution.pdf
What is the evolutionary basis for sexual reproductionSolution.pdfWhat is the evolutionary basis for sexual reproductionSolution.pdf
What is the evolutionary basis for sexual reproductionSolution.pdfarkleatheray
 
Why is it that the Grams stain is not appropriate for acid fast ba.pdf
Why is it that the Grams stain is not appropriate for acid fast ba.pdfWhy is it that the Grams stain is not appropriate for acid fast ba.pdf
Why is it that the Grams stain is not appropriate for acid fast ba.pdfarkleatheray
 
Why does this version of the swap function fail to work Is there a f.pdf
Why does this version of the swap function fail to work Is there a f.pdfWhy does this version of the swap function fail to work Is there a f.pdf
Why does this version of the swap function fail to work Is there a f.pdfarkleatheray
 
Which of the following is NOT a reason why heat is a bad method to ov.pdf
Which of the following is NOT a reason why heat is a bad method to ov.pdfWhich of the following is NOT a reason why heat is a bad method to ov.pdf
Which of the following is NOT a reason why heat is a bad method to ov.pdfarkleatheray
 
What are the trends in browsersSolution1.chrome Google chrom.pdf
What are the trends in browsersSolution1.chrome Google chrom.pdfWhat are the trends in browsersSolution1.chrome Google chrom.pdf
What are the trends in browsersSolution1.chrome Google chrom.pdfarkleatheray
 
The probability of a persons being left-handed is .12. In the 1992.pdf
The probability of a persons being left-handed is .12. In the 1992.pdfThe probability of a persons being left-handed is .12. In the 1992.pdf
The probability of a persons being left-handed is .12. In the 1992.pdfarkleatheray
 
The mass of a radioactive substance follows a continuous exponential.pdf
The mass of a radioactive substance follows a continuous exponential.pdfThe mass of a radioactive substance follows a continuous exponential.pdf
The mass of a radioactive substance follows a continuous exponential.pdfarkleatheray
 
The groin is also known as the _____ region. crural inguinal perin.pdf
The groin is also known as the _____ region.  crural  inguinal  perin.pdfThe groin is also known as the _____ region.  crural  inguinal  perin.pdf
The groin is also known as the _____ region. crural inguinal perin.pdfarkleatheray
 
short answer List and describe two advances during the Industrial Re.pdf
short answer List and describe two advances during the Industrial Re.pdfshort answer List and describe two advances during the Industrial Re.pdf
short answer List and describe two advances during the Industrial Re.pdfarkleatheray
 
SheilaSalmonella agar is _ because _ breaks down amino acids that co.pdf
SheilaSalmonella agar is _ because _ breaks down amino acids that co.pdfSheilaSalmonella agar is _ because _ breaks down amino acids that co.pdf
SheilaSalmonella agar is _ because _ breaks down amino acids that co.pdfarkleatheray
 

More from arkleatheray (20)

briefly write about the Aridity of Subtropics Causes, locations, etc.pdf
briefly write about the Aridity of Subtropics Causes, locations, etc.pdfbriefly write about the Aridity of Subtropics Causes, locations, etc.pdf
briefly write about the Aridity of Subtropics Causes, locations, etc.pdf
 
Compare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdf
Compare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdfCompare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdf
Compare and contrast the Mann-Whitney (aka Wilcoxon Rank Sum) Test w.pdf
 
Determine whether the following statements about the accumulated eang.pdf
Determine whether the following statements about the accumulated eang.pdfDetermine whether the following statements about the accumulated eang.pdf
Determine whether the following statements about the accumulated eang.pdf
 
Discuss the changing demographics of Entrepreneurs and give an examp.pdf
Discuss the changing demographics of Entrepreneurs and give an examp.pdfDiscuss the changing demographics of Entrepreneurs and give an examp.pdf
Discuss the changing demographics of Entrepreneurs and give an examp.pdf
 
Data StructuresPlease I need help completing this c++ program..pdf
Data StructuresPlease I need help completing this c++ program..pdfData StructuresPlease I need help completing this c++ program..pdf
Data StructuresPlease I need help completing this c++ program..pdf
 
Create Student Project Database with insert, select, update, and del.pdf
Create Student Project Database with insert, select, update, and del.pdfCreate Student Project Database with insert, select, update, and del.pdf
Create Student Project Database with insert, select, update, and del.pdf
 
Before 1980, most cell control and management software was written b.pdf
Before 1980, most cell control and management software was written b.pdfBefore 1980, most cell control and management software was written b.pdf
Before 1980, most cell control and management software was written b.pdf
 
at age 51 can you take early distributions from traditional IRA for .pdf
at age 51 can you take early distributions from traditional IRA for .pdfat age 51 can you take early distributions from traditional IRA for .pdf
at age 51 can you take early distributions from traditional IRA for .pdf
 
What is a view What is it used for Give examples when a view can b.pdf
What is a view What is it used for Give examples when a view can b.pdfWhat is a view What is it used for Give examples when a view can b.pdf
What is a view What is it used for Give examples when a view can b.pdf
 
^^^Q3. I am trying to implement double linked list but I was faile.pdf
^^^Q3. I am trying to implement double linked list but I was faile.pdf^^^Q3. I am trying to implement double linked list but I was faile.pdf
^^^Q3. I am trying to implement double linked list but I was faile.pdf
 
What is the evolutionary basis for sexual reproductionSolution.pdf
What is the evolutionary basis for sexual reproductionSolution.pdfWhat is the evolutionary basis for sexual reproductionSolution.pdf
What is the evolutionary basis for sexual reproductionSolution.pdf
 
Why is it that the Grams stain is not appropriate for acid fast ba.pdf
Why is it that the Grams stain is not appropriate for acid fast ba.pdfWhy is it that the Grams stain is not appropriate for acid fast ba.pdf
Why is it that the Grams stain is not appropriate for acid fast ba.pdf
 
Why does this version of the swap function fail to work Is there a f.pdf
Why does this version of the swap function fail to work Is there a f.pdfWhy does this version of the swap function fail to work Is there a f.pdf
Why does this version of the swap function fail to work Is there a f.pdf
 
Which of the following is NOT a reason why heat is a bad method to ov.pdf
Which of the following is NOT a reason why heat is a bad method to ov.pdfWhich of the following is NOT a reason why heat is a bad method to ov.pdf
Which of the following is NOT a reason why heat is a bad method to ov.pdf
 
What are the trends in browsersSolution1.chrome Google chrom.pdf
What are the trends in browsersSolution1.chrome Google chrom.pdfWhat are the trends in browsersSolution1.chrome Google chrom.pdf
What are the trends in browsersSolution1.chrome Google chrom.pdf
 
The probability of a persons being left-handed is .12. In the 1992.pdf
The probability of a persons being left-handed is .12. In the 1992.pdfThe probability of a persons being left-handed is .12. In the 1992.pdf
The probability of a persons being left-handed is .12. In the 1992.pdf
 
The mass of a radioactive substance follows a continuous exponential.pdf
The mass of a radioactive substance follows a continuous exponential.pdfThe mass of a radioactive substance follows a continuous exponential.pdf
The mass of a radioactive substance follows a continuous exponential.pdf
 
The groin is also known as the _____ region. crural inguinal perin.pdf
The groin is also known as the _____ region.  crural  inguinal  perin.pdfThe groin is also known as the _____ region.  crural  inguinal  perin.pdf
The groin is also known as the _____ region. crural inguinal perin.pdf
 
short answer List and describe two advances during the Industrial Re.pdf
short answer List and describe two advances during the Industrial Re.pdfshort answer List and describe two advances during the Industrial Re.pdf
short answer List and describe two advances during the Industrial Re.pdf
 
SheilaSalmonella agar is _ because _ breaks down amino acids that co.pdf
SheilaSalmonella agar is _ because _ breaks down amino acids that co.pdfSheilaSalmonella agar is _ because _ breaks down amino acids that co.pdf
SheilaSalmonella agar is _ because _ breaks down amino acids that co.pdf
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppCeline George
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhleson0603
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppCeline George
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSean M. Fox
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 

Recently uploaded (20)

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 

3. Describe the five basic attacks on authentication systems.4. De.pdf

  • 1. 3. Describe the five basic attacks on authentication systems. 4. Describe how password hashing works a. Provide screenshots of using md5sum in your group VM under your account 5. Why can’t an attacker masquerade by using a hashed password? 6. Explain how biometric systems are vulnerable to the five generic attacks on authentication systems. a. Clone or borrow credential b. Sniff credential c. Trial and error guessing d. Denial of service e. Retrieve from backup Solution 1) and 6) 1.Clone or borrow the credential or token - copy of the credential itself and uses it to log in. 2.Sniff the credential - intercepts and copies it while being transmitted to the login process. 3.Trial-and-error guessing - simply guess several words or names. 4.Denial of service - attack either damages the system or blocks access to it by others. 5.Retrieve from backup - find the authentication database or other information on a backup copy of the hard drive 2) Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string. Hashing is used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key than to find it using the original value. It is also used in many encryption algorithms >As a simple example of the using of hashing in databases, a group of people could be arranged in a database like this: Abernathy, Sara Epperdingle, Roscoe Moore, Wilfred Smith, David (and many more sorted into alphabetical order) >Each of these names would be the key in the database for that person's data. A database search mechanism would first have to start looking character-by-character across the name for matches until it found the match (or ruled the other entries out). But if each of the names were hashed, it might be possible (depending on the number of names in the database) to generate a unique four- digit key for each name
  • 2. For example: 7864 Abernathy, Sara 9802 Epperdingle, Roscoe 1990 Moore, Wilfred 8822 Smith, David (and so forth) >A search for any name would first consist of computing the hash value (using the same hash function used to store the item) and then comparing for a match using that value. It would, in general, be much faster to find a match across four digits, each having only 10 possibilities, than across an unpredictable value length where each character had 26 possibilities. >The hashing algorithm is called the hash function-- probably the term is derived from the idea that the resulting hash value can be thought of as a "mixed up" version of the represented value.