SlideShare a Scribd company logo
1 of 61
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Building Dictionaries and
Destroying Hashes using
Amazon EC2
Steve Werby
[President | Security Researcher | Security Consultant]
Befriend
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
1. Infosec since 1999
2. Former (CISO)3
3. BS Industrial Engineering, MBA, certs
4. Presented at Hack3rCon, SecTor, DerbyCon, ShmooCon,
ConSec, SOURCE Conference, LASCON, BSidesDFW, VA SCAN, EDUCAUSE,
InfraGard, OWASP, ISSA, AITP, IEEE, …
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
1. Value of password resiliency assessments
2. Freely available assessment tools
3. Assessment methodologies
4. Buy or rent
5. Utilizing EC2
6. Hashing algorithm
7. Passphrases vs. passwords
Presentation goals
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Have a question? Ask!
 Have a comment? Share!
 I’ll ask some questions too.
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 One-way functions (non-reversible)
 Outputs a fixed-length string (unique…usually)
 Such as MD5, SHA1, NTLM, and WPA
781ab37e7553fef1809efdf8cff656dc
54e18a5ad5152bd439efe9f1ae53506416bf7cf7
Hashes
1. Username: steve, Password: 2012Election
2. Transmitted to server
3. md5(“2012Election”)
4. Output compared to value stored on server
5. If match, successful login
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 String concatenated with password pre-hashing
 Salt is rand(a-z) – can be from a larger key space
 md5(“w2012Election”)
 Stored in password DB as w:2012Election
781ab37e7553fef1809efdf8cff656dc
54e18a5ad5152bd439efe9f1ae53506416bf7cf7
Salts
1. Key space increased by factor of 26
2. Identical password != identical hash
3. Precomputation data storage increased
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Cracking strategies
1. Precompute hashes for a set of strings
2. Enumerate password hash file
3. Search for match in precomputation file
Precomputation
781ab37e75 fc93d481c1:hunger
fdaa4719ed fdaa3b7c0d:earring
ffe81a52d2 fdaa4719ed:ISACA
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Cracking strategies
1. Enumerate a set of strings
2. Hash the strings
3. Search for match in password hash file
String enumeration
fc93d481c1 ISABY:e715b3aca
fdaa4719ed ISABZ:9c74be0d1a
ffe81a52d2 ISACA:fdaa4719ed
ISACB:0b27cca621
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Number of tests needed
 Time per test
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
NTLM:
MD5:
SHA1:
LM:
SHA512:
60x
40x
20x
10x
x
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Length
 Composition
 Complexity
 Aging
 Construction prohibitions
 Reuse
 Memorization and storage
Your password policy?
Password policies
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Password aging was
intended to reduce the time
a bad actor had to guess a
password. With modern
computing power, this
control isn’t logical and
results in undesirable
user behavior and
reduces IT/infosec trust.
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
1. Gain intelligence about user behavior
2. Assess password policies and user education
3. Strengthen argument for…
technical controls
policy changes
algorithm changes
2FA
But why do it?
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 John the Ripper
 hashcat[-plus|-lite]
 Cryptohaze Multiforcer
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Key space = set of strings to enumerate
 A-Z = 26, a-z = 26, 0-9 = 10
 [A-Z][a-z][a-z][a-z][a-z][a-z][a-z][a-z][0-9]
 (26)^1 * (26)^8 * (10)^1
 13,537,086,546,263,600 ≈ 13.5 thousand trillion
Password1
Key space / brute force attack
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Average adult vocabulary?
 Key space = dictionary size
alamo
Dictionary attack
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Average adult vocabulary?
 Key space = dictionary size
RockYou exposure analysis
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Transformations like using config file to set rules:
Duplication
Reversal
Appending
Repeating
 Key space of dictionary attack * transformations
Alamo!, omal, aallaammoo
Rule attack
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Combines strings from one dictionary with
strings from another
 Dictionary 1 = 10,000 strings
 Dictionary 2 = 50,000 strings
 Combinations = 500 million
 Vs. ~5.4 trillion for [a-z]^9 key space
 Reduces key space by 99.99%
 1 day => 8 seconds
alamocity
Combinator attack
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 It’s Str0ng!
 -1 ?u -2 ?l -3 ?d
 ?1?2?2?2?2?2?2?2?3
 Reduces key space by 99.98%
 1 day => 13 seconds
Password1
Mask attack
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 It’s Str0ng!
 Dictionary + mask
 Mask + dictionary
 Dictionary
 ?1?2?2?2?2?2?2?2?3
 Reduces key space by 99.98%
 1 day => 13 seconds
Password1
Hybrid attack
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 27% of alphabet
 But 62% of first letters of English word usage!
 -1 TASHWIOtashwio -2 ?u?l
 ?1?2?2?2?2?2?2?2
 Reduces key space by 73%
 1 day => 6.5 hours
TASHWIO
Work smart, not hard
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 RockYou – 32.6M plaintext
 eHarmony – 1.5M unsalted MD5
 LinkedIn – 6.5M unsalted SHA1
 Gawker – 1.3M unsalted DES
Large password leaks
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 First 1 million of 1.5
million eHarmony
passwords posted
online in June 2012
 Unsalted MD5s
Analyzing eHarmony’s hashes
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
A CPU isn’t bad, but…
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
1. Use existing hardware
2. Build a cracking box (GPU-based)
3. Look at cloud service providers
My options
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Beefy PSU
 Adequate cooling and electrical
 CPU and RAM relatively unimportant
 Multiple GPUs
Build your own
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Had utilized Amazon EC2 service
 No capital investment to test it
 On-demand
 Scalable
 Had an option that included GPUs
Amazon EC2
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Type of system
 Data transfer
 Data storage
 Purchase
options
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Zelda ($0-ish/hour)
 Pathetic Dell Latitude
 Yoda ($0.32/hour)
 64-bit Ubuntu Server 12.04 LTS
 m1.large (7.5GB RAM, 4 EC2 Compute Units)
 Xzibit ($2.10/hour)
 64-bit Cluster GPU Amazon Linux AMI
 cg1.4xlarge (22GB RAM, 33.5 EC2 Compute Units)
 Wiggum (TBD)
 Yoda (Grand Master) + 5 Jedi Knights
The systems
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 51 tests
 Group 3 – masking
 Group 4 – rules
 Group 5 – combinations
 Group 6 – hybrid (common prefixes + mask)
 Group 7 – hybrid (new dictionary + mask)
 Group 8 – hybrid (mask + common suffix)
 Group 9 – TASHWIO + mask
The tests
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Define sequence of jobs to run
 Analyze results (during and after job)
 Eliminate or adjust jobs based on results
 Create new dictionaries
 Create new rules
 Re-run jobs using new dictionaries and rules
Process
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 No lowercase letters!?
 Whoops!
Analyzing eHarmony’s hashes
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Do not truncate the
password. Do not transform
it to uppercase or
lowercase. Do not limit the
number of characters that
can be utilized. Do not
limit the user to a weak
password.
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Results on Xzibit
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Use long, unpredictable,
random salts. Better still
use bcrypt or PBKDF2.
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
1. Value of password resiliency assessments – insight
2. Freely available assessment tools – hashcat, Cryprtohaze
3. Assessment methodologies – iterative, intelligent
4. Buy or rent – depends on use case and constraints
5. Utilizing EC2 – fast, easy, flexible
6. Hashing algorithm – bcrypt or PBKF2
7. Passphrases vs. passwords – passphrases…for now
Presentation goals recapped
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 $2.10/hour
 54% cracked in 1 hour => $2.10
 69% cracked in 3 hours => $6.30
 77% cracked in 9 hours => $18.90
Cost
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Do not tell your colleagues
the cloud is evil because
you lack visibility. Or
control. Or because you can
do security better. They
will not care. You will lose
credibility. You will be
excluded. And you will lose.
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Xzibit – 1.6B/s
 Yoda – 6.2M/s
 Zelda – 14k/s
Peak speeds
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Xzibit = 258 * Yoda
 Xzibit = $2.10 / hour
 Yoda = $0.32 / hour
 1 hour on Xzibit = 258 hours on Yoda
 258 * $0.32 = $82.56
 Yoda is 3,831% more expensive
Is EC2 worth it?
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Use fast algorithm (say what!?)
 No salt
 [Reused|short|non-random] salt
 Roll your own algorithm
Split the hash file?
Split the password candidates?
Workload distribution strategy
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Use fast algorithm (say what!?)
 No salt
 [Reused|short|non-random] salt
 Roll your own algorithm
1M hashes: 833s
100k hashes: 742s
10% of key space
89% of duration
Split the password candidates
Workload distribution strategy
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
1. Value of password resiliency assessments – insight
2. Freely available assessment tools – hashcat, Cryprtohaze
3. Assessment methodologies – iterative, intelligent
4. Buy or rent – depends on use case and constraints
5. Utilizing EC2 – fast, easy, flexible
6. Hashing algorithm – bcrypt or PBKF2
7. Passphrases vs. passwords – passphrases…for now
What’s next
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Sentences
 Strings of words (careful!)
 Mnemonics (acronyms)
 Transformations similar to password
construction
Passphrases
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 Crowdsource
 Beg for orgs to share them
 Wait until they’re leaked
 Build our own
Acquiring passphrase candidates
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 E-books
 Movie scripts
 Song lyrics
 Tweets
 Any file that contains phrases or sentences
Acquiring passphrase candidates
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 E-books
 Movie scripts
 Song lyrics
 Tweets
 Any file that contains phrases or sentences
 Dictator – instructs on what files to get
 Miner – acquires files
 Hasher – hashes for uniqueness
 Hoarder – adds to queue
 Grabber – pulls file from queue
 Converter – converts to plaintext
 Massager – converts to lower
Passphrase builder
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 E-books
 Movie scripts
 Song lyrics
 Tweets
 Any file that contains phrases or sentences
 Splitter 1 – splits by sentence
 Splitter 2 – splits by word
 Parser – generates strings and acronyms
 Recorder – adds to DB
 Generator – sort, create acronyms, create
output
Passphrase builder
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
 E-books
 Movie scripts
 Song lyrics
 Tweets
 Any file that contains phrases or sentences
 A person who never made a mistake never tried
anything new.
 apwnmamntan
 a person who never
 person who never
 person who never made
 Ranking
 Search engine results
 Frequency in DB
 Matches against leaks
Passphrase builder
Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
Q&A
Steve Werby
steve@befriend.com
Twitter: @stevewerby
http://www.linkedin.com/in/werby

More Related Content

What's hot

Firebase not really_yohoho
Firebase not really_yohohoFirebase not really_yohoho
Firebase not really_yohohoDA-14
 
Workshop: Learning Elasticsearch
Workshop: Learning ElasticsearchWorkshop: Learning Elasticsearch
Workshop: Learning ElasticsearchAnurag Patel
 
PostgreSQL Open SV 2018
PostgreSQL Open SV 2018PostgreSQL Open SV 2018
PostgreSQL Open SV 2018artgillespie
 
Leveraging parse.com for Speedy Development
Leveraging parse.com for Speedy DevelopmentLeveraging parse.com for Speedy Development
Leveraging parse.com for Speedy DevelopmentAndrew Kozlik
 
Building your First Application with Cassandra
Building your First Application with CassandraBuilding your First Application with Cassandra
Building your First Application with CassandraLuke Tillman
 
Aura LA GDG - July 17-2017
Aura LA GDG - July 17-2017Aura LA GDG - July 17-2017
Aura LA GDG - July 17-2017Kristan Uccello
 

What's hot (6)

Firebase not really_yohoho
Firebase not really_yohohoFirebase not really_yohoho
Firebase not really_yohoho
 
Workshop: Learning Elasticsearch
Workshop: Learning ElasticsearchWorkshop: Learning Elasticsearch
Workshop: Learning Elasticsearch
 
PostgreSQL Open SV 2018
PostgreSQL Open SV 2018PostgreSQL Open SV 2018
PostgreSQL Open SV 2018
 
Leveraging parse.com for Speedy Development
Leveraging parse.com for Speedy DevelopmentLeveraging parse.com for Speedy Development
Leveraging parse.com for Speedy Development
 
Building your First Application with Cassandra
Building your First Application with CassandraBuilding your First Application with Cassandra
Building your First Application with Cassandra
 
Aura LA GDG - July 17-2017
Aura LA GDG - July 17-2017Aura LA GDG - July 17-2017
Aura LA GDG - July 17-2017
 

Viewers also liked

Viewers also liked (18)

Booosting gt bcongres 8juni12_berrie_dejonge
Booosting gt bcongres 8juni12_berrie_dejongeBooosting gt bcongres 8juni12_berrie_dejonge
Booosting gt bcongres 8juni12_berrie_dejonge
 
Exam 5th semester group presentation
Exam 5th semester group presentationExam 5th semester group presentation
Exam 5th semester group presentation
 
Pecha kucha by lisa cole
Pecha kucha by lisa colePecha kucha by lisa cole
Pecha kucha by lisa cole
 
Harendra kua
Harendra kuaHarendra kua
Harendra kua
 
water jet cutting....
water jet cutting....water jet cutting....
water jet cutting....
 
Presentation-Demolition-Yıkım
Presentation-Demolition-YıkımPresentation-Demolition-Yıkım
Presentation-Demolition-Yıkım
 
Water jet cutting
Water  jet  cuttingWater  jet  cutting
Water jet cutting
 
Presentation on manufacturing
Presentation on manufacturingPresentation on manufacturing
Presentation on manufacturing
 
water jet cutting
water jet cutting water jet cutting
water jet cutting
 
Water jet cutting by rahul parde
Water jet cutting by rahul pardeWater jet cutting by rahul parde
Water jet cutting by rahul parde
 
Water jet cutting technology
Water jet cutting technologyWater jet cutting technology
Water jet cutting technology
 
Destroying the 7 Myths of B2B Social Media
Destroying the 7 Myths of B2B Social MediaDestroying the 7 Myths of B2B Social Media
Destroying the 7 Myths of B2B Social Media
 
Himalayan tsunami
Himalayan tsunamiHimalayan tsunami
Himalayan tsunami
 
WATER JET CUTTING
WATER JET CUTTINGWATER JET CUTTING
WATER JET CUTTING
 
High Rise Building Research Document
High Rise Building Research DocumentHigh Rise Building Research Document
High Rise Building Research Document
 
Design and analasys of a g+3 residential building using staad
Design and analasys of a g+3 residential building using staadDesign and analasys of a g+3 residential building using staad
Design and analasys of a g+3 residential building using staad
 
Ppt green
Ppt greenPpt green
Ppt green
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 

Similar to Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by Steve Werby at ISACA San Antonio]

Auto scaling with Ruby, AWS, Jenkins and Redis
Auto scaling with Ruby, AWS, Jenkins and RedisAuto scaling with Ruby, AWS, Jenkins and Redis
Auto scaling with Ruby, AWS, Jenkins and RedisYi Hsuan (Jeddie) Chuang
 
How to scale to 100k users using Windows Azure
How to scale to 100k users using Windows AzureHow to scale to 100k users using Windows Azure
How to scale to 100k users using Windows AzureIonut Antiu
 
Why Scale Matters and How the Cloud is Really Different (at scale)
Why Scale Matters and How the Cloud is Really Different (at scale)Why Scale Matters and How the Cloud is Really Different (at scale)
Why Scale Matters and How the Cloud is Really Different (at scale)Amazon Web Services
 
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...Steve Werby
 
NoSQL - No Security?
NoSQL - No Security?NoSQL - No Security?
NoSQL - No Security?Gavin Holt
 
Architecting Cloud Apps
Architecting Cloud AppsArchitecting Cloud Apps
Architecting Cloud Appsjineshvaria
 
NoSQL - No Security? - The BSides Edition
NoSQL - No Security? - The BSides EditionNoSQL - No Security? - The BSides Edition
NoSQL - No Security? - The BSides EditionGavin Holt
 
NoSQL Now! Webinar Series: Innovations in NoSQL Query Languages
NoSQL Now! Webinar Series: Innovations in NoSQL Query Languages  NoSQL Now! Webinar Series: Innovations in NoSQL Query Languages
NoSQL Now! Webinar Series: Innovations in NoSQL Query Languages DATAVERSITY
 
AWS Summit 2013 | India - Opening Keynote, Dr. Werner Vogels
AWS Summit 2013 | India - Opening Keynote, Dr. Werner VogelsAWS Summit 2013 | India - Opening Keynote, Dr. Werner Vogels
AWS Summit 2013 | India - Opening Keynote, Dr. Werner VogelsAmazon Web Services
 
20141021 AWS Cloud Taekwon - Startup Best Practices on AWS
20141021 AWS Cloud Taekwon - Startup Best Practices on AWS20141021 AWS Cloud Taekwon - Startup Best Practices on AWS
20141021 AWS Cloud Taekwon - Startup Best Practices on AWSAmazon Web Services Korea
 
(SOV204) Scaling Up to Your First 10 Million Users | AWS re:Invent 2014
(SOV204) Scaling Up to Your First 10 Million Users | AWS re:Invent 2014(SOV204) Scaling Up to Your First 10 Million Users | AWS re:Invent 2014
(SOV204) Scaling Up to Your First 10 Million Users | AWS re:Invent 2014Amazon Web Services
 
Cloud Security At Netflix, October 2013
Cloud Security At Netflix, October 2013Cloud Security At Netflix, October 2013
Cloud Security At Netflix, October 2013Jay Zarfoss
 
Nosql why and how on Microsoft Azure
Nosql why and how on Microsoft AzureNosql why and how on Microsoft Azure
Nosql why and how on Microsoft AzureVito Flavio Lorusso
 
Day of Cloud: Amazon EC2
Day of Cloud: Amazon EC2Day of Cloud: Amazon EC2
Day of Cloud: Amazon EC2cmcavoy
 
Scaling the Content Repository with Elasticsearch
Scaling the Content Repository with ElasticsearchScaling the Content Repository with Elasticsearch
Scaling the Content Repository with ElasticsearchNuxeo
 
UnConference for Georgia Southern Computer Science March 31, 2015
UnConference for Georgia Southern Computer Science March 31, 2015UnConference for Georgia Southern Computer Science March 31, 2015
UnConference for Georgia Southern Computer Science March 31, 2015Christopher Curtin
 
Samedi SQL Québec - La plateforme data de Azure
Samedi SQL Québec - La plateforme data de AzureSamedi SQL Québec - La plateforme data de Azure
Samedi SQL Québec - La plateforme data de AzureMSDEVMTL
 
Jeff Barr Amazon Services Cloud Computing
Jeff Barr Amazon Services Cloud ComputingJeff Barr Amazon Services Cloud Computing
Jeff Barr Amazon Services Cloud Computingdeimos
 
Habitat & Amazon's ECS
Habitat & Amazon's ECSHabitat & Amazon's ECS
Habitat & Amazon's ECSMatt Ray
 

Similar to Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by Steve Werby at ISACA San Antonio] (20)

Auto scaling with Ruby, AWS, Jenkins and Redis
Auto scaling with Ruby, AWS, Jenkins and RedisAuto scaling with Ruby, AWS, Jenkins and Redis
Auto scaling with Ruby, AWS, Jenkins and Redis
 
How to scale to 100k users using Windows Azure
How to scale to 100k users using Windows AzureHow to scale to 100k users using Windows Azure
How to scale to 100k users using Windows Azure
 
Why Scale Matters and How the Cloud is Really Different (at scale)
Why Scale Matters and How the Cloud is Really Different (at scale)Why Scale Matters and How the Cloud is Really Different (at scale)
Why Scale Matters and How the Cloud is Really Different (at scale)
 
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
 
NoSQL - No Security?
NoSQL - No Security?NoSQL - No Security?
NoSQL - No Security?
 
Architecting Cloud Apps
Architecting Cloud AppsArchitecting Cloud Apps
Architecting Cloud Apps
 
NoSQL - No Security? - The BSides Edition
NoSQL - No Security? - The BSides EditionNoSQL - No Security? - The BSides Edition
NoSQL - No Security? - The BSides Edition
 
NoSQL Now! Webinar Series: Innovations in NoSQL Query Languages
NoSQL Now! Webinar Series: Innovations in NoSQL Query Languages  NoSQL Now! Webinar Series: Innovations in NoSQL Query Languages
NoSQL Now! Webinar Series: Innovations in NoSQL Query Languages
 
AWS Summit 2013 | India - Opening Keynote, Dr. Werner Vogels
AWS Summit 2013 | India - Opening Keynote, Dr. Werner VogelsAWS Summit 2013 | India - Opening Keynote, Dr. Werner Vogels
AWS Summit 2013 | India - Opening Keynote, Dr. Werner Vogels
 
20141021 AWS Cloud Taekwon - Startup Best Practices on AWS
20141021 AWS Cloud Taekwon - Startup Best Practices on AWS20141021 AWS Cloud Taekwon - Startup Best Practices on AWS
20141021 AWS Cloud Taekwon - Startup Best Practices on AWS
 
(SOV204) Scaling Up to Your First 10 Million Users | AWS re:Invent 2014
(SOV204) Scaling Up to Your First 10 Million Users | AWS re:Invent 2014(SOV204) Scaling Up to Your First 10 Million Users | AWS re:Invent 2014
(SOV204) Scaling Up to Your First 10 Million Users | AWS re:Invent 2014
 
Cloud Security At Netflix, October 2013
Cloud Security At Netflix, October 2013Cloud Security At Netflix, October 2013
Cloud Security At Netflix, October 2013
 
Enhancing Databases with Search
Enhancing Databases with SearchEnhancing Databases with Search
Enhancing Databases with Search
 
Nosql why and how on Microsoft Azure
Nosql why and how on Microsoft AzureNosql why and how on Microsoft Azure
Nosql why and how on Microsoft Azure
 
Day of Cloud: Amazon EC2
Day of Cloud: Amazon EC2Day of Cloud: Amazon EC2
Day of Cloud: Amazon EC2
 
Scaling the Content Repository with Elasticsearch
Scaling the Content Repository with ElasticsearchScaling the Content Repository with Elasticsearch
Scaling the Content Repository with Elasticsearch
 
UnConference for Georgia Southern Computer Science March 31, 2015
UnConference for Georgia Southern Computer Science March 31, 2015UnConference for Georgia Southern Computer Science March 31, 2015
UnConference for Georgia Southern Computer Science March 31, 2015
 
Samedi SQL Québec - La plateforme data de Azure
Samedi SQL Québec - La plateforme data de AzureSamedi SQL Québec - La plateforme data de Azure
Samedi SQL Québec - La plateforme data de Azure
 
Jeff Barr Amazon Services Cloud Computing
Jeff Barr Amazon Services Cloud ComputingJeff Barr Amazon Services Cloud Computing
Jeff Barr Amazon Services Cloud Computing
 
Habitat & Amazon's ECS
Habitat & Amazon's ECSHabitat & Amazon's ECS
Habitat & Amazon's ECS
 

More from Steve Werby

Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Steve Werby
 
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Steve Werby
 
Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014Steve Werby
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Steve Werby
 
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...Steve Werby
 
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...Steve Werby
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Steve Werby
 

More from Steve Werby (7)

Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
 
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
 
Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
 
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
 
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by Steve Werby at ISACA San Antonio]

  • 1. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 Building Dictionaries and Destroying Hashes using Amazon EC2 Steve Werby [President | Security Researcher | Security Consultant] Befriend
  • 2. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 1. Infosec since 1999 2. Former (CISO)3 3. BS Industrial Engineering, MBA, certs 4. Presented at Hack3rCon, SecTor, DerbyCon, ShmooCon, ConSec, SOURCE Conference, LASCON, BSidesDFW, VA SCAN, EDUCAUSE, InfraGard, OWASP, ISSA, AITP, IEEE, …
  • 3. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 1. Value of password resiliency assessments 2. Freely available assessment tools 3. Assessment methodologies 4. Buy or rent 5. Utilizing EC2 6. Hashing algorithm 7. Passphrases vs. passwords Presentation goals
  • 4. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Have a question? Ask!  Have a comment? Share!  I’ll ask some questions too.
  • 5. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  One-way functions (non-reversible)  Outputs a fixed-length string (unique…usually)  Such as MD5, SHA1, NTLM, and WPA 781ab37e7553fef1809efdf8cff656dc 54e18a5ad5152bd439efe9f1ae53506416bf7cf7 Hashes 1. Username: steve, Password: 2012Election 2. Transmitted to server 3. md5(“2012Election”) 4. Output compared to value stored on server 5. If match, successful login
  • 6. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  String concatenated with password pre-hashing  Salt is rand(a-z) – can be from a larger key space  md5(“w2012Election”)  Stored in password DB as w:2012Election 781ab37e7553fef1809efdf8cff656dc 54e18a5ad5152bd439efe9f1ae53506416bf7cf7 Salts 1. Key space increased by factor of 26 2. Identical password != identical hash 3. Precomputation data storage increased
  • 7. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 Cracking strategies 1. Precompute hashes for a set of strings 2. Enumerate password hash file 3. Search for match in precomputation file Precomputation 781ab37e75 fc93d481c1:hunger fdaa4719ed fdaa3b7c0d:earring ffe81a52d2 fdaa4719ed:ISACA
  • 8. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 Cracking strategies 1. Enumerate a set of strings 2. Hash the strings 3. Search for match in password hash file String enumeration fc93d481c1 ISABY:e715b3aca fdaa4719ed ISABZ:9c74be0d1a ffe81a52d2 ISACA:fdaa4719ed ISACB:0b27cca621
  • 9. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Number of tests needed  Time per test
  • 10. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 NTLM: MD5: SHA1: LM: SHA512: 60x 40x 20x 10x x
  • 11. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Length  Composition  Complexity  Aging  Construction prohibitions  Reuse  Memorization and storage Your password policy? Password policies
  • 12. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 Password aging was intended to reduce the time a bad actor had to guess a password. With modern computing power, this control isn’t logical and results in undesirable user behavior and reduces IT/infosec trust.
  • 13. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 1. Gain intelligence about user behavior 2. Assess password policies and user education 3. Strengthen argument for… technical controls policy changes algorithm changes 2FA But why do it?
  • 14. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  John the Ripper  hashcat[-plus|-lite]  Cryptohaze Multiforcer
  • 15. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Key space = set of strings to enumerate  A-Z = 26, a-z = 26, 0-9 = 10  [A-Z][a-z][a-z][a-z][a-z][a-z][a-z][a-z][0-9]  (26)^1 * (26)^8 * (10)^1  13,537,086,546,263,600 ≈ 13.5 thousand trillion Password1 Key space / brute force attack
  • 16. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Average adult vocabulary?  Key space = dictionary size alamo Dictionary attack
  • 17. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Average adult vocabulary?  Key space = dictionary size RockYou exposure analysis
  • 18. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Transformations like using config file to set rules: Duplication Reversal Appending Repeating  Key space of dictionary attack * transformations Alamo!, omal, aallaammoo Rule attack
  • 19. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Combines strings from one dictionary with strings from another  Dictionary 1 = 10,000 strings  Dictionary 2 = 50,000 strings  Combinations = 500 million  Vs. ~5.4 trillion for [a-z]^9 key space  Reduces key space by 99.99%  1 day => 8 seconds alamocity Combinator attack
  • 20. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  It’s Str0ng!  -1 ?u -2 ?l -3 ?d  ?1?2?2?2?2?2?2?2?3  Reduces key space by 99.98%  1 day => 13 seconds Password1 Mask attack
  • 21. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  It’s Str0ng!  Dictionary + mask  Mask + dictionary  Dictionary  ?1?2?2?2?2?2?2?2?3  Reduces key space by 99.98%  1 day => 13 seconds Password1 Hybrid attack
  • 22. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  27% of alphabet  But 62% of first letters of English word usage!  -1 TASHWIOtashwio -2 ?u?l  ?1?2?2?2?2?2?2?2  Reduces key space by 73%  1 day => 6.5 hours TASHWIO Work smart, not hard
  • 23. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  RockYou – 32.6M plaintext  eHarmony – 1.5M unsalted MD5  LinkedIn – 6.5M unsalted SHA1  Gawker – 1.3M unsalted DES Large password leaks
  • 24. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  First 1 million of 1.5 million eHarmony passwords posted online in June 2012  Unsalted MD5s Analyzing eHarmony’s hashes
  • 25. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 A CPU isn’t bad, but…
  • 26. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
  • 27. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 1. Use existing hardware 2. Build a cracking box (GPU-based) 3. Look at cloud service providers My options
  • 28. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Beefy PSU  Adequate cooling and electrical  CPU and RAM relatively unimportant  Multiple GPUs Build your own
  • 29. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Had utilized Amazon EC2 service  No capital investment to test it  On-demand  Scalable  Had an option that included GPUs Amazon EC2
  • 30. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
  • 31. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
  • 32. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
  • 33. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
  • 34. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
  • 35. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
  • 36. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
  • 37. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Type of system  Data transfer  Data storage  Purchase options
  • 38. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Zelda ($0-ish/hour)  Pathetic Dell Latitude  Yoda ($0.32/hour)  64-bit Ubuntu Server 12.04 LTS  m1.large (7.5GB RAM, 4 EC2 Compute Units)  Xzibit ($2.10/hour)  64-bit Cluster GPU Amazon Linux AMI  cg1.4xlarge (22GB RAM, 33.5 EC2 Compute Units)  Wiggum (TBD)  Yoda (Grand Master) + 5 Jedi Knights The systems
  • 39. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  51 tests  Group 3 – masking  Group 4 – rules  Group 5 – combinations  Group 6 – hybrid (common prefixes + mask)  Group 7 – hybrid (new dictionary + mask)  Group 8 – hybrid (mask + common suffix)  Group 9 – TASHWIO + mask The tests
  • 40. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Define sequence of jobs to run  Analyze results (during and after job)  Eliminate or adjust jobs based on results  Create new dictionaries  Create new rules  Re-run jobs using new dictionaries and rules Process
  • 41. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  No lowercase letters!?  Whoops! Analyzing eHarmony’s hashes
  • 42. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 Do not truncate the password. Do not transform it to uppercase or lowercase. Do not limit the number of characters that can be utilized. Do not limit the user to a weak password.
  • 43. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 Results on Xzibit
  • 44. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 Use long, unpredictable, random salts. Better still use bcrypt or PBKDF2.
  • 45. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 1. Value of password resiliency assessments – insight 2. Freely available assessment tools – hashcat, Cryprtohaze 3. Assessment methodologies – iterative, intelligent 4. Buy or rent – depends on use case and constraints 5. Utilizing EC2 – fast, easy, flexible 6. Hashing algorithm – bcrypt or PBKF2 7. Passphrases vs. passwords – passphrases…for now Presentation goals recapped
  • 46. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  $2.10/hour  54% cracked in 1 hour => $2.10  69% cracked in 3 hours => $6.30  77% cracked in 9 hours => $18.90 Cost
  • 47. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 Do not tell your colleagues the cloud is evil because you lack visibility. Or control. Or because you can do security better. They will not care. You will lose credibility. You will be excluded. And you will lose.
  • 48. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Xzibit – 1.6B/s  Yoda – 6.2M/s  Zelda – 14k/s Peak speeds
  • 49. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Xzibit = 258 * Yoda  Xzibit = $2.10 / hour  Yoda = $0.32 / hour  1 hour on Xzibit = 258 hours on Yoda  258 * $0.32 = $82.56  Yoda is 3,831% more expensive Is EC2 worth it?
  • 50. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Use fast algorithm (say what!?)  No salt  [Reused|short|non-random] salt  Roll your own algorithm Split the hash file? Split the password candidates? Workload distribution strategy
  • 51. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Use fast algorithm (say what!?)  No salt  [Reused|short|non-random] salt  Roll your own algorithm 1M hashes: 833s 100k hashes: 742s 10% of key space 89% of duration Split the password candidates Workload distribution strategy
  • 52. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
  • 53. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 1. Value of password resiliency assessments – insight 2. Freely available assessment tools – hashcat, Cryprtohaze 3. Assessment methodologies – iterative, intelligent 4. Buy or rent – depends on use case and constraints 5. Utilizing EC2 – fast, easy, flexible 6. Hashing algorithm – bcrypt or PBKF2 7. Passphrases vs. passwords – passphrases…for now What’s next
  • 54. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012
  • 55. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Sentences  Strings of words (careful!)  Mnemonics (acronyms)  Transformations similar to password construction Passphrases
  • 56. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  Crowdsource  Beg for orgs to share them  Wait until they’re leaked  Build our own Acquiring passphrase candidates
  • 57. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  E-books  Movie scripts  Song lyrics  Tweets  Any file that contains phrases or sentences Acquiring passphrase candidates
  • 58. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  E-books  Movie scripts  Song lyrics  Tweets  Any file that contains phrases or sentences  Dictator – instructs on what files to get  Miner – acquires files  Hasher – hashes for uniqueness  Hoarder – adds to queue  Grabber – pulls file from queue  Converter – converts to plaintext  Massager – converts to lower Passphrase builder
  • 59. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  E-books  Movie scripts  Song lyrics  Tweets  Any file that contains phrases or sentences  Splitter 1 – splits by sentence  Splitter 2 – splits by word  Parser – generates strings and acronyms  Recorder – adds to DB  Generator – sort, create acronyms, create output Passphrase builder
  • 60. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012  E-books  Movie scripts  Song lyrics  Tweets  Any file that contains phrases or sentences  A person who never made a mistake never tried anything new.  apwnmamntan  a person who never  person who never  person who never made  Ranking  Search engine results  Frequency in DB  Matches against leaks Passphrase builder
  • 61. Steve Werby (@stevewerby) | ISACA San Antonio: Building Dictionaries and Cracking Hashes with Amazon EC2 | October 23, 2012 Q&A Steve Werby steve@befriend.com Twitter: @stevewerby http://www.linkedin.com/in/werby