SlideShare a Scribd company logo
1 of 55
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Crunching the Top 10,000 Websites'
Password Policies and Controls
Steve Werby
Security Researcher
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Security...
architect => day
researcher => night
Infosec since 1999
Former (CISO)3
BS Industrial Engineering, MBA, certs
Presented at Hack3rCon, SecTor, DerbyCon, ShmooCon,
ConSec, SOURCE Conference, LASCON, BSidesDFW, VA SCAN, EDUCAUSE,
InfraGard, OWASP, ISSA, AITP, IEEE, …
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013

Have a question? Ask!

Have a comment? Share!

I’ll ask some questions too.
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Has an in-depth analysis of password policies
and security controls for a large number of popular
sites been performed?
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Are sites doing a good job at protecting user
accounts?
How much control do security-conscious users
have?
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
What sites to inspect?
What attributes to collect?
How to gather the data?
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Use what you know
Alexa collects and shares information about websites (owned by Amazon)
Data gathered via browser toolbar installed on millions of computers
Ranking based on 3 months average of daily unique visitors + page views
alexa.com
Look up individual sites to find global and US ranking
Top 500 global sites (http://www.alexa.com/topsites)
Top 500 sites by country (http://www.alexa.com/topsites/countries)
Top 1,000,000 global sites (http://s3.amazonaws.com/alexa-static/top-1m.csv.zip)
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
1. google.com
2. facebook.com
3. youtube.com
4. yahoo.com
5. baidu.com
6. wikipedia.org
7. live.com
8. qq.com
9. amazon.com
10. twitter.com
11. blogspot.com
12. taobao.com
13. linkedin.com
14. google.co.in
15. yahoo.co.jp
16. sina.com.cn
17. ebay.com
18. bing.com
19. msn.com
20. google.co.jp
21. yandex.ru
22. wordpress.com
23. google.com.hk
24. google.de
25. vk.com
26. google.fr
27. google.co.uk
28. weibo.com
29. 163.com
30. microsoft.com
31. tumblr.com
32. babylon.com
33. mail.ru
34. googleusercontent.com
35. pinterest.com
36. fc2.com
37. google.com.br
38. conduit.com
39. google.ru
40. amazon.co.jp
41. paypal.com
42. ask.com
43. craigslist.org
44. blogger.com
45. xhamster.com
46. google.it
47. apple.com
48. xvideos.com
49. google.es
50. imdb.com
10000. oursogo.com
What sites to inspect (global top 10k)?
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Getting the Alexa Top 10,000 for the US
Alexa Top Sites (http://aws.amazon.com/alexatopsites/)
Requires Amazon Web Services (AWS) account, sign up for Alexa Top Sites
API that costs $0.0025 per URL returned ($2.50 for 1,000 URLs)
Requires access key and secret key generated via AWS
Getting the data
Read API reference
Grab sample code (Java, Perl, PHP, Ruby)
Pick PHP for spite; modify to meet my needs
Wrap in Bash script
for ((i=0;i<100;i++)); do START=$(echo "$i*100 +1" | bc); RECORDS=100;
php ./amazon_alexa.phpc <access_key> <secret_key> US $RECORDS $START 
| tail -$RECORDS >> alexa_us.txt; done
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
1. google.com
2. facebook.com
3. youtube.com
4. yahoo.com
5. amazon.com
6. bing.com
7. wikipedia.org
8. ebay.com
9. craigslist.org
10. linkedin.com
11. twitter.com
12. live.com
13. blogspot.com
14. go.com
15. pinterest.com
16. msn.com
17. aol.com
18. tumblr.com
19. cnn.com
20. netflix.com
21. ask.com
22. huffingtonpost.com
23. instagram.com
24. paypal.com
25. weather.com
26. espn.go.com
27. wordpress.com
28. conduit.com
29. bankofamerica.com
30. imdb.com
31. chase.com
32. apple.com
33. microsoft.com
34. yelp.com
What sites to inspect (US top 10k)?
35. about.com
36. walmart.com
37. imgur.com
38. comcast.net
39. pornhub.com
40. foxnews.com
41. avg.com
42. wellsfargo.com
43.
googleusercontent.com
44. xvideos.com
45. xhamster.com
46. nytimes.com
47. adobe.com
48. reddit.com
49. nbcnews.com
50. cnet.com
10000. photoblip.com
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Minimum and maximum password length
Password composition requirements
Use of SSL + cookie settings to protect against session hijacking
Anti-CSRF controls
HTTP headers to protect against XSS
Ability to bypass account creation and leverage OAuth providers or OpenID
Password strength meter or strength indicator
2-factor authentication or 2-step authentication
Active logins and login history
CAPTCHA usage on login
Brute force login detection/prevention
Randomness and strength of session IDs
Security question options
Forgotten password options
Education on how and why to create strong password
Server password storage format and hashing details
What attributes to collect?
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Inspecting sites without a firm plan
Started with 20 attributes
Inspected sites, collected data, made notes, added/deleted/modified attributes:
maximum password length => maximum password length accepted on creation
maximum password length displayed
when maximum password length is displayed
maximum password length accepted on change
maximum password length accepted on login
password emailed after account creation
Noticed patterns:
Non-English sites, no user accounts, user accounts but no way to register, costs $
Sites with no internal accounts, only third-party OAuth authorization
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Finding meaning in the chaos
Min length, user education
2FA, last login details
Security questions
SSL, cookie session ID attributes
CAPTCHA, brute force lockout
Password sent in plain text
Previous leaks, response to vulns
Password strength
Unauthorized access prevention/detection
Password recovery (authentication bypass)
Authentication bypass
Attack detection/prevention
Password storage
Breach and vulnerability history
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Inspecting sites without a firm plan (continued)
Determined efficient workflow for data collection
Estimated effort for data collection
Determine whether site has in-scope account creation = 20 seconds
Manual collection of AYCE attributes = 2-8 minutes (average of 4)
Manual collection of diet attributes = 1-4 minutes (average of 2)
70% of sites in-scope
10,000 * (1-0.7) * (20/60) = 1,000 minutes = 17 hours
10,000 * (0.7) * 2 = 14,000 minutes = 234 hours
251 hours total = 126 days @ 2 hours per day
Above ignores semi-automated data collection (brute force attacking, etc.)
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
A better way?
Ask the sites for the data
Blackmail people and force them to collect data
Hire a part-time worker
Partners
Crowdsourcing - paid and unpaid
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Preparing the data
Broke data up into 6 blocks
1-100, 101-250, 251-500, 501-1000, 1001-5000, 5001-10000
Established 3 tiers of attribute breadth and granularity
Tier 1: 1001-5000, 5001-10000 => 18 attributes
Tier 2: 101-250, 251-500, 501-1000 => 22 attributes
Tier 3: 1-100 => 65 attributes
Randomized sites within blocks
cat $INPUT_FILE | awk 'BEGIN{srand();}{print rand()"t"$0}' 
| sort -k1 -n | cut -f2- > $OUTPUT_FILE
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Crowdsourcing - unpaid
Solicited contributors
Great response rate
Twitter (11), Facebook (3), LinkedIn (0), Google+ (didn't bother), family (1)
Divided (and conquered?)
Divided blocks up into chunks of 20 sites
Assigned 1 control site, 19 unique per spreadsheet
Emailed 1 to n spreadsheets to each volunteer
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Crowdsourcing - unpaid
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Crowdsourcing - unpaid
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Crowdsourcing - unpaid
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Crowdsourcing - unpaid
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Validating accuracy of the results
Crowdsourcing (unpaid)
Compared control site data for multiple contributors
Random sampling and comparison to internal data collection
92% of results matched
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Crowdsourcing - paid
More Amazon – this time, Amazon Mechanical Turk
Launched November 2005
Requesters post HITs (Human Intelligence Tasks) with a set compensation
Providers (aka Turkers) search for HITs, select them, complete them
Requesters can accept or reject completed HITs
Typical HITs are very simplistic
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Validating accuracy of the results
Crowdsourcing (paid)
Random sampling and comparison to internal data collection
Created 3 HITs for each site; only paid if 2 matched
Random sampling and comparison to internal data collection
84% of results matched (vs. 92% for unpaid)
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
What was collected
Processed
Tier 3: 1-100 (100% of sites)
Tier 2: 101-250 (91%), 251-500 (73%), 501-1000 (53%)
Tier 1: 1001-5000 (18%), 5001-10000 (7%)
Account registration was performed on 59% of sites analyzed
Reasons it wasn't:
Other => 26%
Not a site with user accounts => 25%
No way to register found => 21%
Cost money or required credit card => 15%
Adult content => 6%
Site not in English => 4%
Can only sign in using a 3rd
party site => 2%
Site wouldn't load => 2%
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Findings
Possible to sign in without creating an account, by signing in with another identity
provider?
Yes => 40%
No => 60%
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Findings
Minimum password length?
1 => 11%
2 => 1%
3 => 2%
4 => 8%
5 => 12%
6 => 46%
7 => 4%
8 => 16%
9+ => 0%
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Findings
Maximum password length?
1-3 => 0% 17-19 => 2%
4 => 1% 20 => 15%
5-9 => ~0% 21-24 => 1%
10 => 3% 25+ => 54%
11 => 1%
12 => 6%
13 => ~0%
14 => ~0%
15 => 10%
16 => 7%
Seemingly limitless
Quit at 8,192 chars no limit detected (tried 40 numbers-no problem)
500+ (no limit)
it accepted 26 characters
30+
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Findings
When is the minimum password length displayed?
Only if password is unacceptable => 48%
Before entering password => 30%
Never => 17%
Other => 3%
If click link/icon for more info => 2%
When is the maximum password length displayed?
Never => 63%
Before entering password => 18%
Only if password is unacceptable => 17%
Other => 2%
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Findings
Password composition requirement?
Yes => 25%
No => 75%
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Findings
Does the login destination page use SSL?
Yes => 53%
No => 36%
Unknown => 11%
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Findings
Is the password automatically emailed after account creation?
Yes => 2%
No => 98%
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Findings
Does the site discourage users from using same password used elsewhere?
Yes => 4%
No => 96%
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Findings
Does the site educate users on how to create a strong password?
Yes => 8%
No => 92%
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Findings
Is there a password strength meter or indicator?
Yes => 17%
No => 83%
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Findings
Is it possible to have an email sent as part of forgotten password process?
Yes, code or URL sent => 76%
Yes, new password sent => 7%
Yes, current password sent => 4%
No => 14%
Are security questions even necessary or appropriate?
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Findings
Is 2FA or 2-step authentication an option?
Yes => 5%
No => 95%
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Are sites doing a good job at protecting user
accounts?
How much control do security-conscious users
have?
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Learning the hard way
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Learning the hard way
Some data is difficult to gather (min and max password length for example)
There's a better iterative way to gather and validate the data
Keep it simple if you want Turkers to be interested and for them to perform well
Test, test, test...and get input from technical and non-technical peers
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Contributors
Tanya Buresh-Werby (@tbwerby) Name Withheld (@Trojan7Sec)
Adam Sealey (@adamsealey Name Withheld #3
Raymond Umerley (@rayumerley) Name Withheld #4
Greg Pendergast (@greg_pendergast) Name Withheld #5
Jess Rutherford (@jofo) Name Withheld #6
Paul Melson (@pmelson) Name Withheld #7
Bob Werby
Renae Roccasano
Ijsbrand Slob (@huppie_)
Name Withheld #1
Chad Sturgill (@csturgill)
Michael Yatsko
Jeff Bryner (@p0wnlabs)
Name Withheld #2 (@snooose)
John Poulin (@forced_request)
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Next steps
Continue data collection and validation
Share analysis of findings by attribute, ranking quartile, and site type
Scoring system that accounts for:
Password strength
Unauthorized access prevention/detection
Password recovery
Authentication bypass
Attack detection/prevention
Password storage
Breach and vulnerability history
Public website to view, add, and update data (and more!)
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Questions for you
Surprised by the results?
Is there other related data you think would be useful to collect?
Do you think it's possible to use this data to influence websites' decisions?
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
Questions for me
Besides “Why isn't your hair orange?”
Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
The opinions shared represent
my views, your views, and everyone
else's views. And are subject to change.
Anything you take offense to was done
by someone else. Don't sue me.

More Related Content

Viewers also liked

Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Steve Werby
 
Product Management and Systems Thinking
Product Management and Systems ThinkingProduct Management and Systems Thinking
Product Management and Systems ThinkingDr. Arne Roock
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Steve Werby
 
Lean Systems Thinking Bob Marshall
Lean Systems Thinking   Bob MarshallLean Systems Thinking   Bob Marshall
Lean Systems Thinking Bob MarshallValtech UK
 
Product Management and Systems Thinking
Product Management and Systems ThinkingProduct Management and Systems Thinking
Product Management and Systems ThinkingDr. Arne Roock
 
System Thinking: Design Tools to Drive Innovation Processes
System Thinking: Design Tools to Drive Innovation Processes System Thinking: Design Tools to Drive Innovation Processes
System Thinking: Design Tools to Drive Innovation Processes Roberta Tassi
 
Bridging enterprise-architecture and systems-thinking
Bridging enterprise-architecture and systems-thinkingBridging enterprise-architecture and systems-thinking
Bridging enterprise-architecture and systems-thinkingTetradian Consulting
 
Jfokus 2015 "Thinking Fast and Slow with Software Development"
Jfokus 2015 "Thinking Fast and Slow with Software Development"Jfokus 2015 "Thinking Fast and Slow with Software Development"
Jfokus 2015 "Thinking Fast and Slow with Software Development"Daniel Bryant
 

Viewers also liked (9)

Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
 
Product Management and Systems Thinking
Product Management and Systems ThinkingProduct Management and Systems Thinking
Product Management and Systems Thinking
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
 
A Collection of Quotes from Peter M. Senge
A Collection of Quotes from Peter M. SengeA Collection of Quotes from Peter M. Senge
A Collection of Quotes from Peter M. Senge
 
Lean Systems Thinking Bob Marshall
Lean Systems Thinking   Bob MarshallLean Systems Thinking   Bob Marshall
Lean Systems Thinking Bob Marshall
 
Product Management and Systems Thinking
Product Management and Systems ThinkingProduct Management and Systems Thinking
Product Management and Systems Thinking
 
System Thinking: Design Tools to Drive Innovation Processes
System Thinking: Design Tools to Drive Innovation Processes System Thinking: Design Tools to Drive Innovation Processes
System Thinking: Design Tools to Drive Innovation Processes
 
Bridging enterprise-architecture and systems-thinking
Bridging enterprise-architecture and systems-thinkingBridging enterprise-architecture and systems-thinking
Bridging enterprise-architecture and systems-thinking
 
Jfokus 2015 "Thinking Fast and Slow with Software Development"
Jfokus 2015 "Thinking Fast and Slow with Software Development"Jfokus 2015 "Thinking Fast and Slow with Software Development"
Jfokus 2015 "Thinking Fast and Slow with Software Development"
 

Similar to Crunching the Top 10000 Websites' Password Policies and Controls [Presented by Steve Werby at richSEC 2013]

Changes in Structured Data at Google (SEO Camp 'us in Paris)
Changes in Structured Data at Google (SEO Camp 'us in Paris)Changes in Structured Data at Google (SEO Camp 'us in Paris)
Changes in Structured Data at Google (SEO Camp 'us in Paris)Bill Slawski
 
How Tracking Companies Circumvented Ad Blockers Using WebSockets
How Tracking Companies Circumvented Ad Blockers Using WebSocketsHow Tracking Companies Circumvented Ad Blockers Using WebSockets
How Tracking Companies Circumvented Ad Blockers Using WebSocketsSajjad "JJ" Arshad
 
Beyond the mcse red teaming active directory
Beyond the mcse  red teaming active directoryBeyond the mcse  red teaming active directory
Beyond the mcse red teaming active directoryPriyanka Aash
 
Web Search And Mining (Ntuim)
Web Search And Mining (Ntuim)Web Search And Mining (Ntuim)
Web Search And Mining (Ntuim)Hector Lin
 
The 7 Deadly Sins of WordPress Security
The 7 Deadly Sins of WordPress SecurityThe 7 Deadly Sins of WordPress Security
The 7 Deadly Sins of WordPress SecurityJoseph Herbrandson
 
Semantic Web: In Quest for the Next Generation Killer Apps
Semantic Web: In Quest for the Next Generation Killer AppsSemantic Web: In Quest for the Next Generation Killer Apps
Semantic Web: In Quest for the Next Generation Killer AppsJie Bao
 
Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016Adrian Cockcroft
 
Colman Hackathon Webhose.io API Reference
Colman Hackathon Webhose.io API ReferenceColman Hackathon Webhose.io API Reference
Colman Hackathon Webhose.io API ReferenceOhad Flinker
 
Google Analytics for Higher Ed: #heweb2010
Google Analytics for Higher Ed: #heweb2010Google Analytics for Higher Ed: #heweb2010
Google Analytics for Higher Ed: #heweb2010Seth Meranda
 
Building Things Fast - and getting approval
Building Things Fast - and getting approvalBuilding Things Fast - and getting approval
Building Things Fast - and getting approvalSimon Willison
 
Using Web 2.0 to Improve How TSA Does Business
Using Web 2.0 to Improve How TSA Does BusinessUsing Web 2.0 to Improve How TSA Does Business
Using Web 2.0 to Improve How TSA Does BusinessPeter Stinson
 
Внедрение SDLC в боевых условиях / Егор Карбутов (Digital Security)
Внедрение SDLC в боевых условиях / Егор Карбутов (Digital Security)Внедрение SDLC в боевых условиях / Егор Карбутов (Digital Security)
Внедрение SDLC в боевых условиях / Егор Карбутов (Digital Security)Ontico
 
Maturation of the Twitter Ecosystem
Maturation of the Twitter EcosystemMaturation of the Twitter Ecosystem
Maturation of the Twitter EcosystemKevin Makice
 
Elasticsearch : petit déjeuner du 13 mars 2014
Elasticsearch : petit déjeuner du 13 mars 2014Elasticsearch : petit déjeuner du 13 mars 2014
Elasticsearch : petit déjeuner du 13 mars 2014ALTER WAY
 
Data Con LA 2022 - Using Google trends data to build product recommendations
Data Con LA 2022 - Using Google trends data to build product recommendationsData Con LA 2022 - Using Google trends data to build product recommendations
Data Con LA 2022 - Using Google trends data to build product recommendationsData Con LA
 
2011 simple-webinar_searchsecrets_trv_l_145_final
 2011 simple-webinar_searchsecrets_trv_l_145_final 2011 simple-webinar_searchsecrets_trv_l_145_final
2011 simple-webinar_searchsecrets_trv_l_145_finalduchess
 
Séminaire Big Data Alter Way - Elasticsearch - octobre 2014
Séminaire Big Data Alter Way - Elasticsearch - octobre 2014Séminaire Big Data Alter Way - Elasticsearch - octobre 2014
Séminaire Big Data Alter Way - Elasticsearch - octobre 2014ALTER WAY
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyeBoost Consulting
 
The Benefits of Google Search for your Oracle WebCenter or Liferay Portal
The Benefits of Google Search for your Oracle WebCenter or Liferay PortalThe Benefits of Google Search for your Oracle WebCenter or Liferay Portal
The Benefits of Google Search for your Oracle WebCenter or Liferay PortalFishbowl Solutions
 

Similar to Crunching the Top 10000 Websites' Password Policies and Controls [Presented by Steve Werby at richSEC 2013] (20)

Changes in Structured Data at Google (SEO Camp 'us in Paris)
Changes in Structured Data at Google (SEO Camp 'us in Paris)Changes in Structured Data at Google (SEO Camp 'us in Paris)
Changes in Structured Data at Google (SEO Camp 'us in Paris)
 
How Tracking Companies Circumvented Ad Blockers Using WebSockets
How Tracking Companies Circumvented Ad Blockers Using WebSocketsHow Tracking Companies Circumvented Ad Blockers Using WebSockets
How Tracking Companies Circumvented Ad Blockers Using WebSockets
 
Beyond the mcse red teaming active directory
Beyond the mcse  red teaming active directoryBeyond the mcse  red teaming active directory
Beyond the mcse red teaming active directory
 
Web Search And Mining (Ntuim)
Web Search And Mining (Ntuim)Web Search And Mining (Ntuim)
Web Search And Mining (Ntuim)
 
The 7 Deadly Sins of WordPress Security
The 7 Deadly Sins of WordPress SecurityThe 7 Deadly Sins of WordPress Security
The 7 Deadly Sins of WordPress Security
 
Semantic Web: In Quest for the Next Generation Killer Apps
Semantic Web: In Quest for the Next Generation Killer AppsSemantic Web: In Quest for the Next Generation Killer Apps
Semantic Web: In Quest for the Next Generation Killer Apps
 
Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016
 
Colman Hackathon Webhose.io API Reference
Colman Hackathon Webhose.io API ReferenceColman Hackathon Webhose.io API Reference
Colman Hackathon Webhose.io API Reference
 
Google Analytics for Higher Ed: #heweb2010
Google Analytics for Higher Ed: #heweb2010Google Analytics for Higher Ed: #heweb2010
Google Analytics for Higher Ed: #heweb2010
 
Building Things Fast - and getting approval
Building Things Fast - and getting approvalBuilding Things Fast - and getting approval
Building Things Fast - and getting approval
 
Using Web 2.0 to Improve How TSA Does Business
Using Web 2.0 to Improve How TSA Does BusinessUsing Web 2.0 to Improve How TSA Does Business
Using Web 2.0 to Improve How TSA Does Business
 
Внедрение SDLC в боевых условиях / Егор Карбутов (Digital Security)
Внедрение SDLC в боевых условиях / Егор Карбутов (Digital Security)Внедрение SDLC в боевых условиях / Егор Карбутов (Digital Security)
Внедрение SDLC в боевых условиях / Егор Карбутов (Digital Security)
 
Maturation of the Twitter Ecosystem
Maturation of the Twitter EcosystemMaturation of the Twitter Ecosystem
Maturation of the Twitter Ecosystem
 
Exploring internet
Exploring internetExploring internet
Exploring internet
 
Elasticsearch : petit déjeuner du 13 mars 2014
Elasticsearch : petit déjeuner du 13 mars 2014Elasticsearch : petit déjeuner du 13 mars 2014
Elasticsearch : petit déjeuner du 13 mars 2014
 
Data Con LA 2022 - Using Google trends data to build product recommendations
Data Con LA 2022 - Using Google trends data to build product recommendationsData Con LA 2022 - Using Google trends data to build product recommendations
Data Con LA 2022 - Using Google trends data to build product recommendations
 
2011 simple-webinar_searchsecrets_trv_l_145_final
 2011 simple-webinar_searchsecrets_trv_l_145_final 2011 simple-webinar_searchsecrets_trv_l_145_final
2011 simple-webinar_searchsecrets_trv_l_145_final
 
Séminaire Big Data Alter Way - Elasticsearch - octobre 2014
Séminaire Big Data Alter Way - Elasticsearch - octobre 2014Séminaire Big Data Alter Way - Elasticsearch - octobre 2014
Séminaire Big Data Alter Way - Elasticsearch - octobre 2014
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet Privacy
 
The Benefits of Google Search for your Oracle WebCenter or Liferay Portal
The Benefits of Google Search for your Oracle WebCenter or Liferay PortalThe Benefits of Google Search for your Oracle WebCenter or Liferay Portal
The Benefits of Google Search for your Oracle WebCenter or Liferay Portal
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 

Crunching the Top 10000 Websites' Password Policies and Controls [Presented by Steve Werby at richSEC 2013]

  • 1. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Crunching the Top 10,000 Websites' Password Policies and Controls Steve Werby Security Researcher
  • 2. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Security... architect => day researcher => night Infosec since 1999 Former (CISO)3 BS Industrial Engineering, MBA, certs Presented at Hack3rCon, SecTor, DerbyCon, ShmooCon, ConSec, SOURCE Conference, LASCON, BSidesDFW, VA SCAN, EDUCAUSE, InfraGard, OWASP, ISSA, AITP, IEEE, …
  • 3. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
  • 4. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013  Have a question? Ask!  Have a comment? Share!  I’ll ask some questions too.
  • 5. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
  • 6. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Has an in-depth analysis of password policies and security controls for a large number of popular sites been performed?
  • 7. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Are sites doing a good job at protecting user accounts? How much control do security-conscious users have?
  • 8. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 What sites to inspect? What attributes to collect? How to gather the data?
  • 9. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Use what you know Alexa collects and shares information about websites (owned by Amazon) Data gathered via browser toolbar installed on millions of computers Ranking based on 3 months average of daily unique visitors + page views alexa.com Look up individual sites to find global and US ranking Top 500 global sites (http://www.alexa.com/topsites) Top 500 sites by country (http://www.alexa.com/topsites/countries) Top 1,000,000 global sites (http://s3.amazonaws.com/alexa-static/top-1m.csv.zip)
  • 10. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 1. google.com 2. facebook.com 3. youtube.com 4. yahoo.com 5. baidu.com 6. wikipedia.org 7. live.com 8. qq.com 9. amazon.com 10. twitter.com 11. blogspot.com 12. taobao.com 13. linkedin.com 14. google.co.in 15. yahoo.co.jp 16. sina.com.cn 17. ebay.com 18. bing.com 19. msn.com 20. google.co.jp 21. yandex.ru 22. wordpress.com 23. google.com.hk 24. google.de 25. vk.com 26. google.fr 27. google.co.uk 28. weibo.com 29. 163.com 30. microsoft.com 31. tumblr.com 32. babylon.com 33. mail.ru 34. googleusercontent.com 35. pinterest.com 36. fc2.com 37. google.com.br 38. conduit.com 39. google.ru 40. amazon.co.jp 41. paypal.com 42. ask.com 43. craigslist.org 44. blogger.com 45. xhamster.com 46. google.it 47. apple.com 48. xvideos.com 49. google.es 50. imdb.com 10000. oursogo.com What sites to inspect (global top 10k)?
  • 11. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Getting the Alexa Top 10,000 for the US Alexa Top Sites (http://aws.amazon.com/alexatopsites/) Requires Amazon Web Services (AWS) account, sign up for Alexa Top Sites API that costs $0.0025 per URL returned ($2.50 for 1,000 URLs) Requires access key and secret key generated via AWS Getting the data Read API reference Grab sample code (Java, Perl, PHP, Ruby) Pick PHP for spite; modify to meet my needs Wrap in Bash script for ((i=0;i<100;i++)); do START=$(echo "$i*100 +1" | bc); RECORDS=100; php ./amazon_alexa.phpc <access_key> <secret_key> US $RECORDS $START | tail -$RECORDS >> alexa_us.txt; done
  • 12. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 1. google.com 2. facebook.com 3. youtube.com 4. yahoo.com 5. amazon.com 6. bing.com 7. wikipedia.org 8. ebay.com 9. craigslist.org 10. linkedin.com 11. twitter.com 12. live.com 13. blogspot.com 14. go.com 15. pinterest.com 16. msn.com 17. aol.com 18. tumblr.com 19. cnn.com 20. netflix.com 21. ask.com 22. huffingtonpost.com 23. instagram.com 24. paypal.com 25. weather.com 26. espn.go.com 27. wordpress.com 28. conduit.com 29. bankofamerica.com 30. imdb.com 31. chase.com 32. apple.com 33. microsoft.com 34. yelp.com What sites to inspect (US top 10k)? 35. about.com 36. walmart.com 37. imgur.com 38. comcast.net 39. pornhub.com 40. foxnews.com 41. avg.com 42. wellsfargo.com 43. googleusercontent.com 44. xvideos.com 45. xhamster.com 46. nytimes.com 47. adobe.com 48. reddit.com 49. nbcnews.com 50. cnet.com 10000. photoblip.com
  • 13. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Minimum and maximum password length Password composition requirements Use of SSL + cookie settings to protect against session hijacking Anti-CSRF controls HTTP headers to protect against XSS Ability to bypass account creation and leverage OAuth providers or OpenID Password strength meter or strength indicator 2-factor authentication or 2-step authentication Active logins and login history CAPTCHA usage on login Brute force login detection/prevention Randomness and strength of session IDs Security question options Forgotten password options Education on how and why to create strong password Server password storage format and hashing details What attributes to collect?
  • 14. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
  • 15. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Inspecting sites without a firm plan Started with 20 attributes Inspected sites, collected data, made notes, added/deleted/modified attributes: maximum password length => maximum password length accepted on creation maximum password length displayed when maximum password length is displayed maximum password length accepted on change maximum password length accepted on login password emailed after account creation Noticed patterns: Non-English sites, no user accounts, user accounts but no way to register, costs $ Sites with no internal accounts, only third-party OAuth authorization
  • 16. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Finding meaning in the chaos Min length, user education 2FA, last login details Security questions SSL, cookie session ID attributes CAPTCHA, brute force lockout Password sent in plain text Previous leaks, response to vulns Password strength Unauthorized access prevention/detection Password recovery (authentication bypass) Authentication bypass Attack detection/prevention Password storage Breach and vulnerability history
  • 17. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Inspecting sites without a firm plan (continued) Determined efficient workflow for data collection Estimated effort for data collection Determine whether site has in-scope account creation = 20 seconds Manual collection of AYCE attributes = 2-8 minutes (average of 4) Manual collection of diet attributes = 1-4 minutes (average of 2) 70% of sites in-scope 10,000 * (1-0.7) * (20/60) = 1,000 minutes = 17 hours 10,000 * (0.7) * 2 = 14,000 minutes = 234 hours 251 hours total = 126 days @ 2 hours per day Above ignores semi-automated data collection (brute force attacking, etc.)
  • 18. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
  • 19. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 A better way? Ask the sites for the data Blackmail people and force them to collect data Hire a part-time worker Partners Crowdsourcing - paid and unpaid
  • 20. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Preparing the data Broke data up into 6 blocks 1-100, 101-250, 251-500, 501-1000, 1001-5000, 5001-10000 Established 3 tiers of attribute breadth and granularity Tier 1: 1001-5000, 5001-10000 => 18 attributes Tier 2: 101-250, 251-500, 501-1000 => 22 attributes Tier 3: 1-100 => 65 attributes Randomized sites within blocks cat $INPUT_FILE | awk 'BEGIN{srand();}{print rand()"t"$0}' | sort -k1 -n | cut -f2- > $OUTPUT_FILE
  • 21. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Crowdsourcing - unpaid Solicited contributors Great response rate Twitter (11), Facebook (3), LinkedIn (0), Google+ (didn't bother), family (1) Divided (and conquered?) Divided blocks up into chunks of 20 sites Assigned 1 control site, 19 unique per spreadsheet Emailed 1 to n spreadsheets to each volunteer
  • 22. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Crowdsourcing - unpaid
  • 23. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Crowdsourcing - unpaid
  • 24. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Crowdsourcing - unpaid
  • 25. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Crowdsourcing - unpaid
  • 26. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Validating accuracy of the results Crowdsourcing (unpaid) Compared control site data for multiple contributors Random sampling and comparison to internal data collection 92% of results matched
  • 27. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
  • 28. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
  • 29. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Crowdsourcing - paid More Amazon – this time, Amazon Mechanical Turk Launched November 2005 Requesters post HITs (Human Intelligence Tasks) with a set compensation Providers (aka Turkers) search for HITs, select them, complete them Requesters can accept or reject completed HITs Typical HITs are very simplistic
  • 30. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
  • 31. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
  • 32. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
  • 33. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Validating accuracy of the results Crowdsourcing (paid) Random sampling and comparison to internal data collection Created 3 HITs for each site; only paid if 2 matched Random sampling and comparison to internal data collection 84% of results matched (vs. 92% for unpaid)
  • 34. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 What was collected Processed Tier 3: 1-100 (100% of sites) Tier 2: 101-250 (91%), 251-500 (73%), 501-1000 (53%) Tier 1: 1001-5000 (18%), 5001-10000 (7%) Account registration was performed on 59% of sites analyzed Reasons it wasn't: Other => 26% Not a site with user accounts => 25% No way to register found => 21% Cost money or required credit card => 15% Adult content => 6% Site not in English => 4% Can only sign in using a 3rd party site => 2% Site wouldn't load => 2%
  • 35. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Findings Possible to sign in without creating an account, by signing in with another identity provider? Yes => 40% No => 60%
  • 36. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Findings Minimum password length? 1 => 11% 2 => 1% 3 => 2% 4 => 8% 5 => 12% 6 => 46% 7 => 4% 8 => 16% 9+ => 0%
  • 37. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Findings Maximum password length? 1-3 => 0% 17-19 => 2% 4 => 1% 20 => 15% 5-9 => ~0% 21-24 => 1% 10 => 3% 25+ => 54% 11 => 1% 12 => 6% 13 => ~0% 14 => ~0% 15 => 10% 16 => 7% Seemingly limitless Quit at 8,192 chars no limit detected (tried 40 numbers-no problem) 500+ (no limit) it accepted 26 characters 30+
  • 38. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Findings When is the minimum password length displayed? Only if password is unacceptable => 48% Before entering password => 30% Never => 17% Other => 3% If click link/icon for more info => 2% When is the maximum password length displayed? Never => 63% Before entering password => 18% Only if password is unacceptable => 17% Other => 2%
  • 39. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Findings Password composition requirement? Yes => 25% No => 75%
  • 40. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Findings Does the login destination page use SSL? Yes => 53% No => 36% Unknown => 11%
  • 41. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Findings Is the password automatically emailed after account creation? Yes => 2% No => 98%
  • 42. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Findings Does the site discourage users from using same password used elsewhere? Yes => 4% No => 96%
  • 43. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Findings Does the site educate users on how to create a strong password? Yes => 8% No => 92%
  • 44. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Findings Is there a password strength meter or indicator? Yes => 17% No => 83%
  • 45. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Findings Is it possible to have an email sent as part of forgotten password process? Yes, code or URL sent => 76% Yes, new password sent => 7% Yes, current password sent => 4% No => 14% Are security questions even necessary or appropriate?
  • 46. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Findings Is 2FA or 2-step authentication an option? Yes => 5% No => 95%
  • 47. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013
  • 48. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Are sites doing a good job at protecting user accounts? How much control do security-conscious users have?
  • 49. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Learning the hard way
  • 50. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Learning the hard way Some data is difficult to gather (min and max password length for example) There's a better iterative way to gather and validate the data Keep it simple if you want Turkers to be interested and for them to perform well Test, test, test...and get input from technical and non-technical peers
  • 51. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Contributors Tanya Buresh-Werby (@tbwerby) Name Withheld (@Trojan7Sec) Adam Sealey (@adamsealey Name Withheld #3 Raymond Umerley (@rayumerley) Name Withheld #4 Greg Pendergast (@greg_pendergast) Name Withheld #5 Jess Rutherford (@jofo) Name Withheld #6 Paul Melson (@pmelson) Name Withheld #7 Bob Werby Renae Roccasano Ijsbrand Slob (@huppie_) Name Withheld #1 Chad Sturgill (@csturgill) Michael Yatsko Jeff Bryner (@p0wnlabs) Name Withheld #2 (@snooose) John Poulin (@forced_request)
  • 52. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Next steps Continue data collection and validation Share analysis of findings by attribute, ranking quartile, and site type Scoring system that accounts for: Password strength Unauthorized access prevention/detection Password recovery Authentication bypass Attack detection/prevention Password storage Breach and vulnerability history Public website to view, add, and update data (and more!)
  • 53. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Questions for you Surprised by the results? Is there other related data you think would be useful to collect? Do you think it's possible to use this data to influence websites' decisions?
  • 54. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 Questions for me Besides “Why isn't your hair orange?”
  • 55. Steve Werby (@stevewerby) | richSEC: Crunching the Top 10,000 Websites' Password Policies and Controls | August 22, 2013 The opinions shared represent my views, your views, and everyone else's views. And are subject to change. Anything you take offense to was done by someone else. Don't sue me.

Editor's Notes

  1. [REFERENCE] McKayla Maroney is not impressed. [MENTION] I’ve been cracking passwords professionally for around 13 years. Around the time I started, used John the Ripper church/jesus (now might have Tebow in it) Failures in technology, process and human – phishing guy Monday and Wednesday