Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: dp0622; palmer

‘Couldn’t someone run billions of combinations to get access? or is that just in the movies’

That works with old systems. I hope and pray Obama hasn’t kept us THAT antiquited.

But I’m not a tech guy.

Palmer is.

My fuzzy understanding is this:

Modern systems are protected through offering you only a few chances — like four — within a short period of time. Then there are ‘cool down’ periods which can get longer and longer. That prevents ‘powering’ as I understand it.

The concept of powering began as an automatic safe cracking machine. It had a spinner [probably not the right term but ...], an automated spinning machine modeled after a lathe that you put on the safe’s dial. It would ‘power’ its way through every possible number to cause each tumbler to ‘click’.


75 posted on 10/22/2016 4:45:00 AM PDT by Arthur Wildfire! March (Hillary's Trickle Up policy: take bribes, sell sleazy pardons, water down AIDS medicine.)
[ Post Reply | Private Reply | To 49 | View Replies ]


To: Arthur Wildfire! March
Yes, you are describing protections against brute forcing. When a system is remote from an attacker, the attacker must connect, try a password or key, then try a few more times while the remote system returns failure messages. After a small number of attempts the remote system closes the connection and times out or it can time out between attempts. At some number of failed attempts it can simply lock out the account.

Even better if an attacker fails with some number of obvious passwords (e.g. pass, password, pass123, changeme, etc) then the remote system can determine that it is being attacked. At that point the remote system can redirect the attacker into a honeypot. Now the trick is to fool the attacker into thinking they got in when they did not. That means presenting delicious looking data that is actually fake. The whole idea is to waste the attacker's time and computing resources in a giant dead end.

Even better is to draw the attacker into the honeypot and then assume that the attacker uses insecure code to parse the data that they steal. Then present the attacker with delicious looking data that actually contains your own trojan horses. The attacker steals the data and starts to parse it on their machine and the data exploits a weakness in their parse and takes over their machine. Now you are not just wasting the attacker's time, but you are potentially destroying some of their capability.

77 posted on 10/22/2016 6:00:48 AM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 75 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson