LAVA.PASSWORD.FACT
ORY
PASSWORDS ARE BAD AND YOU CAN TOO!!
A BRIEF INTRODUCTION
AGENDA
1. What is authentication?
2. Why do passwords exist?
3. Why attack authentication mechanisms?
1. Password-based attacks
4. LavaPasswordFactory
1. Demonstration
5. Conclusion / Questions
WHO AM I?
• Christopher Grayson
• cegrayson3@gmail.com
• @_lavalamp
• Senior Security Analyst at
Bishop Fox (Pen-Testing
FTW)
• MSCS, BSCM from GT
• Former Research Scientist
from GT
• Former president, GT
hacking club
That guy in the front…
WHAT IS AUTHENTICATION?
THE BASICS
• It’s all about identity
baby
• Something you know
• Something you have
• Something you are
SOMETHING YOU KNOW
• Passwords
• Personal knowledge
(security questions)
• Only those that know
X should have access.
SOMETHING YOU HAVE
• RSA SecurID
• Google Authenticator
• Only those that have
X should be allowed
access.
SOMETHING YOU ARE
• Most nebulous of the
three
• Commonly refers to
biometrics (iris scans
for instance)
• Only those who are X
should be allowed
access.
TAKEAWAYS
• Authentication mechanisms aim to identify
who you are for the purpose of establishing
the correct level of authority.
• Without accurately identifying someone, how
can one hope to apply any meaningful
identity-based security controls?
PESKY PESKY PASSWORDS
WHYYYYYYY?!
• Easy to implement
• Usually easy to
remember
• Requires the lowest
amount of technical
overhead
• Many other reasons…
PASSWORDS ARE BAD, M’KAY?
• When used properly,
passwords can provide
a decent level of
security.
• Passwords are largely
used improperly, even
within the security
community.
COMMON PASSWORD PROBLEMS
• Low complexity
• Password re-use
• Writing passwords
down
SOME TANGIBLE DATA
Credit to Karl Sigler, The Register
http://www.theregister.co.uk/2014/08/15/hundreds_of_thousands_of_corporate_passwords_cracke
ATTACKING PASSWORDS
WHY ATTACK
AUTHENTICATION?
• Automated systems
typically have different
roles meant for different
users.
• Correctly identifying a user
supplies that user with the
intended level of authority.
• Even in an incredibly
secure system, if you can
trick the system into
thinking you’re an admin,
many security controls fall
away.
ONLINE PASSWORD ATTACKS
• Logging into a Web site
• Logging into network
services
• Don’t have access to
hashed representation
of passwords
OFFLINE PASSWORD ATTACKS
• Typically a data store
has been compromised
• Have direct access to
hashed representation
of passwords
• Can break passwords at
much larger scale
LAVA.PASSWORD.FACTORY
SHINY NEW TOOL
• Generates passwords
for offline and online
attacks
• Cleans existing
password lists
• Uses a set of seed
words
• Has functionality for
matching password
policies
DEMONSTRATION
GETTING IT
• https://github.com/lavalamp-
/LavaPasswordFactory
• Still a work-in-progress, but current work is
only to add more functionality.
• Comments and feature requests welcome!
QUESTIONS?
THANK YOU!
@_LAVALAMP

Introduction to LavaPasswordFactory