19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 7: Passwords<br />

The National Vulnerability Database (an index of computer vulnerabilities<br />

managed by the National Institute of Standards and Technology) currently<br />

identifies over 2,500 password-related vulnerabilities! You can search for<br />

these issues at http://nvd.nist.gov to find out how vulnerable some of<br />

your systems are from a technical perspective.<br />

Cracking Passwords<br />

Password cracking is one of the most enjoyable hacks for the bad guys. It<br />

fuels their sense of exploration and desire to figure out a problem. You might<br />

not have a burning desire to explore everyone’s passwords, but it helps to<br />

approach password cracking with this mindset. So where should you start<br />

hacking the passwords on your systems? Generally, any user’s password<br />

works. After you obtain one password, you can often obtain others — including<br />

administrator or root passwords.<br />

Administrator passwords are the pot of gold. With unauthorized administrative<br />

access, you (or a criminal hacker) can do virtually anything on the<br />

system. When looking for your organization’s password vulnerabilities, I<br />

recommend first trying to obtain the highest level of access possible (such as<br />

administrator) through the most discreet method possible. That’s often what<br />

the bad guys do.<br />

You can use low-tech ways and high-tech ways to exploit vulnerabilities to<br />

obtain passwords. For example, you can deceive users into divulging passwords<br />

over the telephone or simply observe what a user has written down<br />

on a piece of paper. Or you can capture passwords directly from a computer,<br />

over a network, and via the Internet with the tools covered in the following<br />

sections.<br />

Cracking passwords the old-fashioned way<br />

A hacker can use low-tech methods to crack passwords. These methods<br />

include using social engineering techniques, shoulder surfing, and simply<br />

guessing passwords from information that he knows about the user.<br />

Social engineering<br />

The most popular low-tech method for gathering passwords is social engineering,<br />

which I cover in detail in Chapter 5. Social engineering takes advantage<br />

of the trusting nature of human beings to gain information that later can<br />

be used maliciously. A common social engineering technique is simply to con<br />

people into divulging their passwords. It sounds ridiculous, but it happens all<br />

the time.<br />

97

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!