Page 67 - DCAP516_COMPUTER_SECURITY
P. 67

Unit 6: User Authentication




               The ID determines whether the user is authorized to gain access to a system. In some  Notes
               systems, only those who already have an ID filed on the system are allowed to gain access.

               The ID determines the privileges accorded to the user. A few users may have supervisory
               or “super-user” status that enables them to read files and perform functions that are
               especially protected by the operating system. Some systems have guest or anonymous
               accounts and users of these accounts have more limited privileges than others.
               The ID is used in what is referred to as discretionary access control. For example, by listing
               the IDs of the other users, a sure may grant permission to them to read files owned by that
               user.
          Passwords are, by far, the most popular factor used for authentication. Therefore, protecting
          passwords from compromise and unauthorized use is crucial.
          Similar to a one-time pad in cryptography, a one-time password provides the highest level of
          password security. Because a new password is required every time a user logs on to the network,
          an attacker cannot use a previously compromised password.
          A password that changes frequently is called a dynamic password. A password that is the same
          for each logon is called a static password. An organization can require that passwords change
          monthly, quarterly, or at other intervals, depending on the sensitivity of the protected information
          and the password’s frequency of use.
          In some instances, a passphrase can be used instead of a password. A passphrase is a sequence of
          characters that is usually longer than the allotted number of characters for a password. The
          passphrase is converted into a virtual password by the system.
          Passwords can be generated automatically by credit card, sized memory cards, smart cards, or
          devices resembling small calculators. Some of these devices are referred to as tokens.

          6.3.1 Attacks on Password

          To understand how to protect yourself from a password attack, you should become familiar
          with the most commonly used types of attacks. With that information, you can use password
          cracking tools and techniques to regularly audit your own organization’s passwords and
          determine whether your defenses need bolstering. To that end, here’s a primer of the most
          widely used types of attacks:
          1.   Password Guessing: The most common type of attack is password guessing. Attackers can
               guess passwords locally or remotely using either a manual or automated approach.
               Password guessing isn’t always as difficult as you’d expect. Most networks aren’t configured
               to require long and complex passwords, and an attacker needs to find only one weak
               password to gain access to a network. Not all authentication protocols are equally effective
               against guessing attacks. For example, because LAN Manager authentication is case-
               insensitive, a password guessing attack against it doesn’t need to consider whether letters
               in the password are uppercase or lowercase.
               Many tools can automate the process of typing password after password. Some common
               password guessing tools are Hydra (see http://www.thc.org for links to the downloadable
               tool), for guessing all sorts of passwords, including HTTP, Telnet, and Windows logons;
               TSGrinder (http://www.hammerofgod.com/download.htm), for brute-force attacks
               against Terminal Services and RDP connections; and SQLRecon (http://
               www.sqlsecurity.com/DesktopDefault.aspx?tabid=26), for brute-force attacks against SQL
               authentication.






                                           LOVELY PROFESSIONAL UNIVERSITY                                   61
   62   63   64   65   66   67   68   69   70   71   72