SlideShare a Scribd company logo
Passwords &
Authentication
Congratulations on you new job
• In you new job you have been asked to come up with a password
policy for a financial institution.
• In groups of 3 to 4 discuss the different scenarios whereby authentication will
be required.
• Devise a password policy.
• Ask Questions
Threats
• Brute-force attacks
• Account Hijacking
• Social Engineering
• Spamming
• Man in the middle
• Unauthorised access
• Networking sniffing
Enforcing Strong Passwords
Guidelines
• Password Length (Min 8 characters)
• Max Password Length (Not Limited)
• Multiple Character Sets (Required)
• Allowing Any Keyboard Character
• Not allowing dictionary words
• Not allowing username in password
• Difficulty remembering Passwords
• Passphrase
Brute-force Math
• Future Proof (Moore’s Law)
• Password constructed from 26 letters & 6 letters long.
# passwords = nX = 266 = 308,915,776
• 309 million passwords will take a good cracking program 30 minutes to compute every
combination.
• So this will take on average 15 minutes to crack this password
Brute-force Math
• If we allow lower and upper case characters we increase from 26 to 52 the pool of characters and
increase the password length to 8.
• # passwords = nX =528 = 53,459,728,531,456
• 53.5 trillion possibilities
If we allow numbers and keyboard symbols the character set increases to 94.
• # passwords = nX =948 = 6,095,689,385,410,816
• 6 quadrillion possibilities
• Beyond the reach of the ordinary hacker.
• What about the future?
Default Passwords
• Review your systems to identify default accounts.
• Change default account passwords.
• This includes hardware & software.
• Also Test and UAT accounts review.
• Password & Account Generation
• Customer Service
• Predictable password generation
• Sequential account names
• Oblivious Accounts (admin, test, UAT etc…)
• http://default-password.info/
Credential Harvesting
• Opens the door for Brute-force, Social Engineering & Spamming Attacks.
• What information does your application provide to an unauthenticated user? (Verbose Failure
Messages)
• Gmail (Credential Harvesting)
• So what if the username is not returned?
• Can we register for an account and will this tell us if the username is already in use.
• Passing Credentials at login
• Always in a POST
• After Login
(http://www.temp.com/mail.aspx?name=tom)
Idle Accounts
• Easy Target
• How to handle Idle Accounts
• Put Account on hold for a time period
• Actively monitor account
• Email account user of activity
• Do not automatically activate online account with customer data.
• Automated account creation should not be sequenced or predictive.
Password Storage
• 3 methods for storing passwords
• 1. Plaintext :-(
• 2. Ciphertext :-|
• 3. One-way hash ;-)
• Employees don’t know passwords.
• If the database is hacked all passwords are not compromised.
• http://md5-hash-online.waraxe.us/
• http://md5.web-max.ca/
Changing Passwords
• Allow users to change passwords themselves
• Intuitive interface
• Remind / Force Password change
• Must know old password before change.
• New password entry twice
• Conformation via mail or other
• Expire session after password change
• Require new login with new credentials
Forgot My Password
• Security Questions (Poor)
• What is your pet’s name
• In what year was your father born
• In what county where you born?
• What is the color of your eyes?
• What is your favorite sport?
• In what city were you born?
• What is your favorite color?
• What is your address, phone number?
Security Questions
• Top 20 pet names are Max, Buddy Molly ?.
• City you were born
• Top 20 largest cities easily found.
• Schools Attended
• 25,000 to 30,000 high schools in US
• Favourite movie
• IMBD.com top 100
• Mothers maiden name
• 25,000 surnames in US
• Favourite colour
• 100 common colours
• Should be treated as securely as passwords. (Stored Securely)
Beyond Passwords
• Something you know
• Something you have (RSA Key)
• Something you are
• Fingerprint, Hand
• Voice
• Facial scan
• Iris Scan
• Retina Scan
Review
• Enforce Strong Passwords
• Avoid easily guessed credentials
• Prevent credential harvesting
• Secure password storage
• Implement a password aging policy
• Changing password policy
• Security questions
• Always, Always, Always, encrypt traffic from the login page.
• Put username and password in a POST message. Why?
Review
• Non Unique Usernames Problem.
• Multistage Login Problem.
• Remember me functionality.
• Correct validation of credentials
• Log Monitor & Notify
• All Authentication events should be logged
• Anomalies in authentication should be processed in real-time
• User out-of-band communications
• User in-band communications

More Related Content

Similar to Passwords

Password protection
Password protectionPassword protection
Password protectionpost_it
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
Rare Input
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Codewizacademy
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To Basics
Joel Cardella
 
Electronic Authentication, More Than Just a Password
Electronic Authentication, More Than Just a PasswordElectronic Authentication, More Than Just a Password
Electronic Authentication, More Than Just a Password
Nicholas Davis
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
Sagar Verma
 
Introduction to LavaPasswordFactory
Introduction to LavaPasswordFactoryIntroduction to LavaPasswordFactory
Introduction to LavaPasswordFactory
Christopher Grayson
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
Nicholas Davis
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
vishalgohel12195
 
Data Migration Best Practices
Data Migration Best PracticesData Migration Best Practices
Data Migration Best Practices
Jennifer Soares
 
Ethicak hacking
Ethicak hackingEthicak hacking
Ethicak hacking
Kshitij Rokde
 
Finalised refresh digital champion training
Finalised  refresh digital champion trainingFinalised  refresh digital champion training
Finalised refresh digital champion training
Irene Mackintosh
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
ConnectSafely
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
AVG Technologies AU
 
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonData Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Vlad Catrinescu
 
Password Management
Password ManagementPassword Management
Password Management
Rick Chin
 
Better Passwords = Better Security
Better Passwords = Better SecurityBetter Passwords = Better Security
Better Passwords = Better Security
nFront Security
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
zaimorkai
 
2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptx2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptx
ssuser2f0fb0
 
Dox Yourself BSides Orlando
Dox Yourself BSides OrlandoDox Yourself BSides Orlando
Dox Yourself BSides Orlando
Samuel Greenfeld
 

Similar to Passwords (20)

Password protection
Password protectionPassword protection
Password protection
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To Basics
 
Electronic Authentication, More Than Just a Password
Electronic Authentication, More Than Just a PasswordElectronic Authentication, More Than Just a Password
Electronic Authentication, More Than Just a Password
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Introduction to LavaPasswordFactory
Introduction to LavaPasswordFactoryIntroduction to LavaPasswordFactory
Introduction to LavaPasswordFactory
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Data Migration Best Practices
Data Migration Best PracticesData Migration Best Practices
Data Migration Best Practices
 
Ethicak hacking
Ethicak hackingEthicak hacking
Ethicak hacking
 
Finalised refresh digital champion training
Finalised  refresh digital champion trainingFinalised  refresh digital champion training
Finalised refresh digital champion training
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
 
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonData Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
 
Password Management
Password ManagementPassword Management
Password Management
 
Better Passwords = Better Security
Better Passwords = Better SecurityBetter Passwords = Better Security
Better Passwords = Better Security
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
 
2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptx2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptx
 
Dox Yourself BSides Orlando
Dox Yourself BSides OrlandoDox Yourself BSides Orlando
Dox Yourself BSides Orlando
 

More from GrittyCC

Copyright Protection
Copyright ProtectionCopyright Protection
Copyright Protection
GrittyCC
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
GrittyCC
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
GrittyCC
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
GrittyCC
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
GrittyCC
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
GrittyCC
 
International Cybercrime (Part 3)
International Cybercrime (Part 3)International Cybercrime (Part 3)
International Cybercrime (Part 3)
GrittyCC
 
Computer Evidence/Computer Misuse Act 1990 cases
Computer Evidence/Computer Misuse Act 1990 casesComputer Evidence/Computer Misuse Act 1990 cases
Computer Evidence/Computer Misuse Act 1990 cases
GrittyCC
 

More from GrittyCC (8)

Copyright Protection
Copyright ProtectionCopyright Protection
Copyright Protection
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
International Cybercrime (Part 3)
International Cybercrime (Part 3)International Cybercrime (Part 3)
International Cybercrime (Part 3)
 
Computer Evidence/Computer Misuse Act 1990 cases
Computer Evidence/Computer Misuse Act 1990 casesComputer Evidence/Computer Misuse Act 1990 cases
Computer Evidence/Computer Misuse Act 1990 cases
 

Recently uploaded

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 

Passwords

  • 2. Congratulations on you new job • In you new job you have been asked to come up with a password policy for a financial institution. • In groups of 3 to 4 discuss the different scenarios whereby authentication will be required. • Devise a password policy. • Ask Questions
  • 3. Threats • Brute-force attacks • Account Hijacking • Social Engineering • Spamming • Man in the middle • Unauthorised access • Networking sniffing
  • 4. Enforcing Strong Passwords Guidelines • Password Length (Min 8 characters) • Max Password Length (Not Limited) • Multiple Character Sets (Required) • Allowing Any Keyboard Character • Not allowing dictionary words • Not allowing username in password • Difficulty remembering Passwords • Passphrase
  • 5. Brute-force Math • Future Proof (Moore’s Law) • Password constructed from 26 letters & 6 letters long. # passwords = nX = 266 = 308,915,776 • 309 million passwords will take a good cracking program 30 minutes to compute every combination. • So this will take on average 15 minutes to crack this password
  • 6. Brute-force Math • If we allow lower and upper case characters we increase from 26 to 52 the pool of characters and increase the password length to 8. • # passwords = nX =528 = 53,459,728,531,456 • 53.5 trillion possibilities If we allow numbers and keyboard symbols the character set increases to 94. • # passwords = nX =948 = 6,095,689,385,410,816 • 6 quadrillion possibilities • Beyond the reach of the ordinary hacker. • What about the future?
  • 7. Default Passwords • Review your systems to identify default accounts. • Change default account passwords. • This includes hardware & software. • Also Test and UAT accounts review. • Password & Account Generation • Customer Service • Predictable password generation • Sequential account names • Oblivious Accounts (admin, test, UAT etc…) • http://default-password.info/
  • 8. Credential Harvesting • Opens the door for Brute-force, Social Engineering & Spamming Attacks. • What information does your application provide to an unauthenticated user? (Verbose Failure Messages) • Gmail (Credential Harvesting) • So what if the username is not returned? • Can we register for an account and will this tell us if the username is already in use. • Passing Credentials at login • Always in a POST • After Login (http://www.temp.com/mail.aspx?name=tom)
  • 9. Idle Accounts • Easy Target • How to handle Idle Accounts • Put Account on hold for a time period • Actively monitor account • Email account user of activity • Do not automatically activate online account with customer data. • Automated account creation should not be sequenced or predictive.
  • 10. Password Storage • 3 methods for storing passwords • 1. Plaintext :-( • 2. Ciphertext :-| • 3. One-way hash ;-) • Employees don’t know passwords. • If the database is hacked all passwords are not compromised. • http://md5-hash-online.waraxe.us/ • http://md5.web-max.ca/
  • 11. Changing Passwords • Allow users to change passwords themselves • Intuitive interface • Remind / Force Password change • Must know old password before change. • New password entry twice • Conformation via mail or other • Expire session after password change • Require new login with new credentials
  • 12. Forgot My Password • Security Questions (Poor) • What is your pet’s name • In what year was your father born • In what county where you born? • What is the color of your eyes? • What is your favorite sport? • In what city were you born? • What is your favorite color? • What is your address, phone number?
  • 13. Security Questions • Top 20 pet names are Max, Buddy Molly ?. • City you were born • Top 20 largest cities easily found. • Schools Attended • 25,000 to 30,000 high schools in US • Favourite movie • IMBD.com top 100 • Mothers maiden name • 25,000 surnames in US • Favourite colour • 100 common colours • Should be treated as securely as passwords. (Stored Securely)
  • 14. Beyond Passwords • Something you know • Something you have (RSA Key) • Something you are • Fingerprint, Hand • Voice • Facial scan • Iris Scan • Retina Scan
  • 15. Review • Enforce Strong Passwords • Avoid easily guessed credentials • Prevent credential harvesting • Secure password storage • Implement a password aging policy • Changing password policy • Security questions • Always, Always, Always, encrypt traffic from the login page. • Put username and password in a POST message. Why?
  • 16. Review • Non Unique Usernames Problem. • Multistage Login Problem. • Remember me functionality. • Correct validation of credentials • Log Monitor & Notify • All Authentication events should be logged • Anomalies in authentication should be processed in real-time • User out-of-band communications • User in-band communications