16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

312 Chapter 13<br />

domain controllers, or Active Directories, with or without SYSKEY installed. The<br />

software is capable of sniffing encrypted passwords from the challenge/response<br />

exchanged when one machine authenticates to another over the network. This software<br />

allows administrators to match the rigor of their password audit to their particular needs<br />

by choosing from three different types of cracking methods: dictionary, hybrid, and<br />

brute force analysis. These methods are discussed in the next section. Finally, using<br />

a distributed processing approach, LC4 provides administrators with the capability<br />

to perform time-consuming audits by breaking them into parts that can be run<br />

simultaneously on multiple machines.<br />

13.2.4.2 Password Cracking for Self-Defense<br />

Using a tool such as LC4 internally enables an organization’s password auditor to get a<br />

quantitative comparison of password strength. This is done by reviewing LC4’s report<br />

on the time required to crack each password. A Hide feature even allows administrators<br />

the option to know whether a password was cracked without knowing what the password<br />

was. Password results can be exported to a tab-delimited file for sorting, formatting or<br />

further manipulation in applications such as Microsoft Excel. LC4 makes password<br />

auditing accessible to less-experienced password auditors by using an optional Wizard<br />

that walks new users through the process of configuring and running their password audit,<br />

letting them choose from preconfigured configurations. As mentioned previously, when<br />

performing the cracking process, three cracking methods (dictionary, hybrid, and brute<br />

force analysis) are used. In his Web-based article [7] “ Hacking Techniques: Introduction<br />

to Password Cracking, ” Rob Shimonski provides an excellent description of these three<br />

methods, as follows:<br />

1. Dictionary attack . A simple dictionary attack is by far the fastest way to break<br />

into a machine. A dictionary file (a text file full of dictionary words) is loaded<br />

into a cracking application (such as L0phtCrack), which is run against user<br />

accounts located by the application. Because most passwords are simplistic,<br />

running a dictionary attack is often sufficient to do the job.<br />

2. Hybrid attack . Another well-known form of attack is the hybrid attack. A hybrid<br />

attack will add numbers or symbols to the filename to successfully crack a<br />

password. Many people change their passwords by simply adding a number to<br />

the end of their current password. The pattern usually takes this form: first month<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!