SlideShare a Scribd company logo
1 of 21
Ethical Hacking 
CHAPTER 12 – ENCRYPTION 
ERIC VANDERBURG
Expiration, Revocation, and 
Suspension of Certificates 
 A period of validity is assigned to each certificate 
 After that date, the certificate expires 
 A certificate can be renewed with a new expiration date assigned 
 If the keys are still valid and remain uncompromised 
 Reasons to suspend or revoke a certificate 
 A user leaves the company 
 A hardware crash causes a key to be lost 
 A private key is compromised
Expiration, Revocation, and 
Suspension of Certificates 
(continued)  Certificate Revocation List (CRL) 
 Contains all revoked and suspended certificates 
 Issued by CAs 
 Suspension of a certificate might be done when one or more parties 
fail to honor agreements 
 Suspension makes it easier to restore if the parties come to an 
agreement at a later date
Backing Up Keys 
 Backing up keys is critical 
 If keys are destroyed and not backed up properly, encrypted business-critical 
information might be irretrievable 
 The CA is usually responsible for backing up keys 
 A key recovery policy is also part of the CA’s responsibility
Microsoft Root CA 
 Available in Windows Server 2003 and Windows 2000 Server 
 Steps for setting up a Microsoft Root CA 
 Install the Certificate Services 
 Note that after installing this service the name of the domain or 
computer cannot change 
 Configuring a Windows server as a CA (four options) 
 Enterprise root CA 
 Enterprise subordinate CA 
 Stand-alone root CA 
 Stand-alone subordinate CA
Microsoft Root CA (continued) 
 Steps for setting up a Microsoft Root CA (continued) 
 Specify options to generate certificates, including 
 Cryptographic Service Provider 
 Hash algorithm 
 Key length
Understanding Cryptographic 
Attacks 
 Attacks studied so far are passive attacks 
 Active attacks attempt to determine the secret key being used to 
encrypt plaintext 
 Cryptographic algorithms are usually public 
 Follows the open-source culture
Birthday Attack 
 Old adage 
 If 23 people are in a room, two will share the same birthday 
 Birthday attacks are used to find the same hash value for two 
different inputs 
 A birthday attack is used to reveal any mathematical 
weaknesses in hashing algorithms 
 SHA-1 uses a 160-bit key 
 Theoretically, it would require 280 computations to break 
 SHA-1 has already been broken
Mathematical Attacks 
 Properties of the algorithm are attacked by using mathematical 
computations 
 Categories 
 Ciphertext-only attack 
 The attacker has the ciphertext of several messages but not the plaintext 
 Attacker tries to find out the key used to encrypt the messages 
 Attacker can capture ciphertext using a sniffer program such as Ethereal or 
Tcpdump
Mathematical Attacks (continued) 
 Categories (continued) 
 Known plaintext attack 
 The attacker has messages in both encrypted form and decrypted forms 
 This attack is easier to perform than the ciphertext-only attack 
 Looks for patterns in both plaintext and ciphertext 
 Chosen-plaintext attack 
 The attacker has access to plaintext and ciphertext 
 Attacker has the ability to choose which message to encrypt
Mathematical Attacks (continued) 
 Categories (continued) 
 Chosen-ciphertext attack 
 The attacker has access to the ciphertext to be decrypted and to the 
resulting plaintext 
 Attacker needs access to the cryptosystem to perform this type of attack
Brute Force Attack 
 An attacker tries to guess passwords by attempting every possible 
combination of letters 
 Requires lots of time and patience 
 Password-cracking program 
 John the Ripper
Man-in-the-Middle Attack 
 Attackers place themselves between the victim computer and 
another host computer 
 They then intercept messages sent from the victim to the host and 
pretend to be the host computer 
 This type of attack follows this process 
 Gloria sends her public key to Bruce, and you, the attacker, intercept 
the key and send Bruce your public key 
 Bruce sends Gloria his public key. You intercept this key and send your 
public key to Gloria
Man-in-the-Middle Attack 
(continued) 
 This type of attack follows this process (continued) 
 Gloria sends an encrypted message to Bruce but uses your key 
 You can decrypt the message with your private key 
 You reencrypt the message using Bruce’s public key and send it to 
Bruce 
 Bruce answers Gloria with another encrypted message with your public 
key 
 You can decrypt the message with your private key 
 You reencrypt the message using Gloria’s public key and send it to 
Gloria
Dictionary Attack 
 Attacker uses a dictionary of known words to try to guess passwords 
 There are programs that can help attackers run a dictionary attack
Replay Attack 
 The attacker captures data and attempts to resubmit the 
captured data 
 The device thinks a legitimate connection is in effect 
 If the captured data was logon information, the attacker 
could gain access to a system and be authenticated
Understanding Password Cracking 
 Password cracking is illegal in the United States 
 It is legal to crack your own password if you forgot it 
 You must first obtain the password file from the system that 
stores user names and passwords 
 File is stored in the /Etc/Passwd or /Etc/Shadow directory for *NIX 
systems 
 A dictionary attack can be performed on the file by using 
automated programs
Understanding Password Cracking 
(continued) 
 Password cracking programs 
 John the Ripper 
 Hydra (THC) 
 EXPECT 
 L0phtcrack 
 Pwdump3v2 
 Steps for cracking passwords 
 Run the Pwdump2 program to get hash values of user accounts 
 Perform a brute force attack using John the Ripper
Summary 
 Cryptography has been in existence since the dawn of 
civilization 
 Ciphertext: data that has been encrypted 
 Cleartext or plaintext: data than can be intercepted and read 
by anyone 
 Symmetric cryptography: uses one key to encrypt and decrypt 
data 
 Examples: DES, DEA, 3DES, and AES 
 Asymmetric cryptography: uses two keys, one key to encrypt 
and another to decrypt data 
 Examples: RSA, Elgamal, Diffie-Hellman
Summary (continued) 
 Digital Signature Standard (DSS): ensures that digital signatures 
can be verified 
 PGP: free public key encryption program to encrypt e-mail 
messages 
 Hashing algorithms are used to verify data integrity 
 Public key infrastructure (PKI): structure made up of many 
different components used to encrypt data 
 Digital certificate: binds a public key to information about its 
owner 
 Issued by a Certificate Authority (CA)
Summary (continued) 
 Active attacks 
 Birthday attacks 
 Brute force attacks 
 Man-in-the-middle attacks 
 Replay attacks 
 Dictionary attacks

More Related Content

What's hot

Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Wail Hassan
 
Module 20 (buffer overflows)
Module 20 (buffer overflows)Module 20 (buffer overflows)
Module 20 (buffer overflows)Wail Hassan
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshellYahia Kandeel
 
Digital Immunity -The Myths and Reality
Digital Immunity -The Myths and RealityDigital Immunity -The Myths and Reality
Digital Immunity -The Myths and Realityamiable_indian
 
Chapter 09
Chapter 09Chapter 09
Chapter 09 Google
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasureskaranwayne
 
Op Sy 03 Ch 61
Op Sy 03 Ch 61Op Sy 03 Ch 61
Op Sy 03 Ch 61 Google
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hackingleminhvuong
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux SecurityGeo Marian
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanningamiable_indian
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Ch09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability AssessmentsCh09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability AssessmentsInformation Technology
 
Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajaliwebhostingguy
 

What's hot (20)

Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 
Module 20 (buffer overflows)
Module 20 (buffer overflows)Module 20 (buffer overflows)
Module 20 (buffer overflows)
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
Digital Immunity -The Myths and Reality
Digital Immunity -The Myths and RealityDigital Immunity -The Myths and Reality
Digital Immunity -The Myths and Reality
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
Op Sy 03 Ch 61
Op Sy 03 Ch 61Op Sy 03 Ch 61
Op Sy 03 Ch 61
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
Windows network
Windows networkWindows network
Windows network
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux Security
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Ch09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability AssessmentsCh09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability Assessments
 
Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajali
 
Ch18
Ch18Ch18
Ch18
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
 
Ch20
Ch20Ch20
Ch20
 

Similar to Ethical hacking Chapter 12 - Encryption - Eric Vanderburg

Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a Google
 
Cryptography /Sankar jayam
Cryptography /Sankar jayamCryptography /Sankar jayam
Cryptography /Sankar jayamtasankar14
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackMona Rajput
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
Cryptanalysis and Attacks
Cryptanalysis and AttacksCryptanalysis and Attacks
Cryptanalysis and AttacksShahbaz Anjam
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comphanleson
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 

Similar to Ethical hacking Chapter 12 - Encryption - Eric Vanderburg (20)

Cryptography
CryptographyCryptography
Cryptography
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
Cryptography /Sankar jayam
Cryptography /Sankar jayamCryptography /Sankar jayam
Cryptography /Sankar jayam
 
Sankar jayam
Sankar jayamSankar jayam
Sankar jayam
 
Brute force
Brute forceBrute force
Brute force
 
Brute Forcing
Brute ForcingBrute Forcing
Brute Forcing
 
security issue
security issuesecurity issue
security issue
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic Attack
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Communication security
Communication securityCommunication security
Communication security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Cryptanalysis and Attacks
Cryptanalysis and AttacksCryptanalysis and Attacks
Cryptanalysis and Attacks
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.com
 
Cryptography
CryptographyCryptography
Cryptography
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 

More from Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatEric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology managementEric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technologyEric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challengesEric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: RoboticsEric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercisesEric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemEric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgEric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Ethical hacking Chapter 12 - Encryption - Eric Vanderburg

  • 1. Ethical Hacking CHAPTER 12 – ENCRYPTION ERIC VANDERBURG
  • 2. Expiration, Revocation, and Suspension of Certificates  A period of validity is assigned to each certificate  After that date, the certificate expires  A certificate can be renewed with a new expiration date assigned  If the keys are still valid and remain uncompromised  Reasons to suspend or revoke a certificate  A user leaves the company  A hardware crash causes a key to be lost  A private key is compromised
  • 3. Expiration, Revocation, and Suspension of Certificates (continued)  Certificate Revocation List (CRL)  Contains all revoked and suspended certificates  Issued by CAs  Suspension of a certificate might be done when one or more parties fail to honor agreements  Suspension makes it easier to restore if the parties come to an agreement at a later date
  • 4. Backing Up Keys  Backing up keys is critical  If keys are destroyed and not backed up properly, encrypted business-critical information might be irretrievable  The CA is usually responsible for backing up keys  A key recovery policy is also part of the CA’s responsibility
  • 5. Microsoft Root CA  Available in Windows Server 2003 and Windows 2000 Server  Steps for setting up a Microsoft Root CA  Install the Certificate Services  Note that after installing this service the name of the domain or computer cannot change  Configuring a Windows server as a CA (four options)  Enterprise root CA  Enterprise subordinate CA  Stand-alone root CA  Stand-alone subordinate CA
  • 6. Microsoft Root CA (continued)  Steps for setting up a Microsoft Root CA (continued)  Specify options to generate certificates, including  Cryptographic Service Provider  Hash algorithm  Key length
  • 7. Understanding Cryptographic Attacks  Attacks studied so far are passive attacks  Active attacks attempt to determine the secret key being used to encrypt plaintext  Cryptographic algorithms are usually public  Follows the open-source culture
  • 8. Birthday Attack  Old adage  If 23 people are in a room, two will share the same birthday  Birthday attacks are used to find the same hash value for two different inputs  A birthday attack is used to reveal any mathematical weaknesses in hashing algorithms  SHA-1 uses a 160-bit key  Theoretically, it would require 280 computations to break  SHA-1 has already been broken
  • 9. Mathematical Attacks  Properties of the algorithm are attacked by using mathematical computations  Categories  Ciphertext-only attack  The attacker has the ciphertext of several messages but not the plaintext  Attacker tries to find out the key used to encrypt the messages  Attacker can capture ciphertext using a sniffer program such as Ethereal or Tcpdump
  • 10. Mathematical Attacks (continued)  Categories (continued)  Known plaintext attack  The attacker has messages in both encrypted form and decrypted forms  This attack is easier to perform than the ciphertext-only attack  Looks for patterns in both plaintext and ciphertext  Chosen-plaintext attack  The attacker has access to plaintext and ciphertext  Attacker has the ability to choose which message to encrypt
  • 11. Mathematical Attacks (continued)  Categories (continued)  Chosen-ciphertext attack  The attacker has access to the ciphertext to be decrypted and to the resulting plaintext  Attacker needs access to the cryptosystem to perform this type of attack
  • 12. Brute Force Attack  An attacker tries to guess passwords by attempting every possible combination of letters  Requires lots of time and patience  Password-cracking program  John the Ripper
  • 13. Man-in-the-Middle Attack  Attackers place themselves between the victim computer and another host computer  They then intercept messages sent from the victim to the host and pretend to be the host computer  This type of attack follows this process  Gloria sends her public key to Bruce, and you, the attacker, intercept the key and send Bruce your public key  Bruce sends Gloria his public key. You intercept this key and send your public key to Gloria
  • 14. Man-in-the-Middle Attack (continued)  This type of attack follows this process (continued)  Gloria sends an encrypted message to Bruce but uses your key  You can decrypt the message with your private key  You reencrypt the message using Bruce’s public key and send it to Bruce  Bruce answers Gloria with another encrypted message with your public key  You can decrypt the message with your private key  You reencrypt the message using Gloria’s public key and send it to Gloria
  • 15. Dictionary Attack  Attacker uses a dictionary of known words to try to guess passwords  There are programs that can help attackers run a dictionary attack
  • 16. Replay Attack  The attacker captures data and attempts to resubmit the captured data  The device thinks a legitimate connection is in effect  If the captured data was logon information, the attacker could gain access to a system and be authenticated
  • 17. Understanding Password Cracking  Password cracking is illegal in the United States  It is legal to crack your own password if you forgot it  You must first obtain the password file from the system that stores user names and passwords  File is stored in the /Etc/Passwd or /Etc/Shadow directory for *NIX systems  A dictionary attack can be performed on the file by using automated programs
  • 18. Understanding Password Cracking (continued)  Password cracking programs  John the Ripper  Hydra (THC)  EXPECT  L0phtcrack  Pwdump3v2  Steps for cracking passwords  Run the Pwdump2 program to get hash values of user accounts  Perform a brute force attack using John the Ripper
  • 19. Summary  Cryptography has been in existence since the dawn of civilization  Ciphertext: data that has been encrypted  Cleartext or plaintext: data than can be intercepted and read by anyone  Symmetric cryptography: uses one key to encrypt and decrypt data  Examples: DES, DEA, 3DES, and AES  Asymmetric cryptography: uses two keys, one key to encrypt and another to decrypt data  Examples: RSA, Elgamal, Diffie-Hellman
  • 20. Summary (continued)  Digital Signature Standard (DSS): ensures that digital signatures can be verified  PGP: free public key encryption program to encrypt e-mail messages  Hashing algorithms are used to verify data integrity  Public key infrastructure (PKI): structure made up of many different components used to encrypt data  Digital certificate: binds a public key to information about its owner  Issued by a Certificate Authority (CA)
  • 21. Summary (continued)  Active attacks  Birthday attacks  Brute force attacks  Man-in-the-middle attacks  Replay attacks  Dictionary attacks