Posted on 07/22/2003 8:38:27 PM PDT by Timesink
To: BugTraq
Subject: Cracking windows passwords in 5 seconds
Date: Jul 22 2003 8:37PM
Author: Philippe Oechslin
As opposed to unix, windows password hashes can be calculated in advance because no salt or other random information si involved. This makes so called time-memory trade-off attacks possible. This vulnerability is not new but we think that we have the first tool to exploit this.
At LASEC (lasecwww.epfl.ch) we have developed an advanced time-memory trade-off method. It is based on original work which was done in 1980 but has never been applied to windows passwords. It works by calculating all possible hashes in advance and storing some of them in an organized table. The more information you keep in the table, the faster the cracking will be.
We have implemented an online demo of this method which cracks alphanumerical passwords in 5 seconds average (see http://lasecpc13.epfl.ch/ntcrack). With the help of 0.95GB of data we can find the password after an average of 4 million hash operation. A brute force cracker would need to calculate an average of 50% of all hashes, which amounts to about 40 billion hases for alphanumerical passwords (lanman hash).
More info about the method can be found at in a paper at http://lasecwww.epfl.ch/php_code/publications/search.php?ref=Oech03.
Philippe Oechslin
Of these, only longer passwords help against either brute-force or storage/time tradeoff attacks. (You probably know that, but many readers might not.)
Funny that. I call it the real world. :-)
This does not mean that I take security lightly. Quite the opposite. As a network manager it is the most important thing that I do. What it does mean though, is that there ARE, like it or not, certain realities that will turn security measures counterproductive.
Want eight-character complex passwords for all users? Fine, but then know that all you have to do to get access to the network is to start looking for sticky notes under keyboards. That's the only way users will be able to remember them.
Want permanent lockout on three bad passwords? Fine... but know that all I have to do to lock your CEO out of the network is try his email user against your VPN concentrator three times and I've just locked him out of your network. What fun!!
Want users to encrypt all their local data? fine... but don't let them come running to me when they forget the password they changed last night after the ninth scotch and now you have to make a presentation on a multimillion dollar contract in an hour.
Me... I'll be happy with something else.
It depends on how valuable the information stored on it is, and thus, how determined and ruthless your potential attackers are likely to be. Give me physical control of the box, physical control of you, and a pair of pliers, and I'll be on as root in less than twenty minutes, I expect. And there are plenty of installations out there where this is a very real risk - don't underestimate the utility of access control for protecting you and the system. There's not much point in breaking your fingers to get your password if I still can't get at the machine once I have it.
;-)
Simply ask yourself, do ATM users have trouble accessing their account information? Do ATM users have hideously long, complex passwords or utilize encryption so severe that if they lose their password they are forever locked out of their banking accounts?
If the answer is "no", then ask yourself, why would I treat my corporate users to any lower level of useability and security than that which is enjoyed by ATM and POS terminal users?
Is the answer, "I don't know any better", or "I don't like them", or "I haven't really thought about an architectural solution"?
Now, what was my damn password; am I logged in here? Hello?
I should clarify, I mean attacks on the password hash, as in the article.
Is it a standard feature of the operating system?
Otherwise, you know of course that they'll be blaming YOU when their data is useless because they forgot their password on the day of the big presentation.
There is not much danger of that happening. On Mac OS X 10.3, the user only needs to remember is their login password - something they typically already use. After they login, the encryption/decryption process works automatically and transparently.
Now, if the user dies and someone else needs to access the files, that could be a problem.
Yes, I know.
My previous statements stand, however. :-)
babysteps. :-)
On some very secure systems, the user is given two passwords. One password is for normal access, and the second password is for "duress" access.
Duress is when a foreign agent is beating the crap out of your wife and baby daughter until you give him a password that accesses all of your information.
Except that while the "duress" password will give said access to most or all of your critical data, it also signals your own team to come swooping in to the rescue.
In the civilian world, something very similar is done with web honeypot servers, which lure crackers in with "real looking" data and help the feds bust them.
Typically, a good honeypot server will have "valid" credit card numbers on it, for instance, but using those numbers will have the feds on you in mere minutes, as they are programmed in to the network to signal that a crime is in progress. Use the credit card number from a honeypot and you **will** get busted.
It's all a careful balance in the long run.
Just kidding. My favorite ATM scam was the two guys who bought an old retired ATM shell at a corporate auction (the Colorado S&L had gone bankrupt back in the 1980's).
They put an Apple computer inside and rigged it to record the account data on the ATM card and the PIN data that the user typed in.
And they wheeled that puppy into a shopping mall like they owned the place.
People started lining up to use it only to get "Sorry, no funds available" error messages.
Then they came back after the weekend was over, took the machine home and then began manufacturing their own ATM cards from the valid account numbers, matched to the PINs that were typed in.
Pretty gutsy!
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.