Passwords Flashcards

1
Q

Password Storage forms(3)

A
  1. Plaintext(bad)
  2. Encrypted(fair)
  3. Hashed(good)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Password related techniques(4)

A
  1. Password storage forms
  2. Password policies
  3. Salting passwords
  4. Alternative password forms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of passwords(4)

A
  1. Passphrases: user enters long phrases/sentences that are hashed to become passwords
  2. One Time Passwords
  3. Visual Passwords
  4. Picture Passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One way functions properties and example

A
  • ensures password security
  • easy to compute and hard to reverse
    eg. hash functions: input of arbitrary length produces output of fixed length
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hash functions properties(2 general)

A
  1. Preimage resistance: given hash value y, computationally infeasible to calculate x where H(x)=y
  2. Collision resistance: computationally infeasible to find pair(x,y) where x!=y and H(x) = h(Y)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hash functions examples for crypto and password hashing(2 each)

A

crypto: SHA256, KECCAK
password hashing: ARGON2, bcrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Plaintext password and 1 -ve

A

claimant password checked against password DB
-ve: No protection against attacker, dispute over real user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hashed passwords

A
  • only hashed password stored
  • claimant password gets hashed and checked against hashed password DB
  • protection against hacker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack on passwords(2)

A
  1. Offline Guessing Attacks
    - Exhaustive attacks
    - Dictionary attacks
  2. Phishing and Spoofing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Offline Guessing attack overview + why it is a threat + 3 incidents

A
  • attacker gets hashed password and attempts to guess passwords
  • threat if user uses same passwords for different accounts and due to server hacks or traffic sniffing
  • password incidents: SingHealth breach,Adobe breach, Linkedin password leaked
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Brute force attack + Solution
A
  • guess password by going through passwords and hashes to check for match
    Sol: Increase space of possible passwords, measured with password entropy 2^k
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Password entropy for dummies

A

2^k = (number of character types)^length of password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Dictionary Attack
A
  • can attack hashed passwords
  • exploit weakness in human picked passwords based on words in natural languages
  • same password has same hash value
    1. Guess commonly used passwords
    2. Compute hash values
    3. Look for same hash value in password file
  • sped up with precomputed hash table
  • cheap to crack passwords due to high speed hardware and cloud services
  • Strong password: modern hashing algo + hashing best practices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pre computed hash table

A
  • contains password and their hashes
  • with n bits and k password possibilities, table is size k x n
  • NOT practical if k is large(ideal)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password salting

A
  • prevents precomputed hashes being effective
  • salt(random string) added to password before applying hash function
  • diff salt => diff hashes
  • salt of n bit: needs 2^n hashes for same password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password Storage summary

A
  • store passwords to prevent them from being obtained by attacker even if DB compromised
  • slow down offline attacks by choosing hash algorithms that are resource intensive/slow, work factor was changed
17
Q

Hashing VS Encryption

A
  • passwords hashed NOT encrypted
  • Hashing: one way function to check passwords
  • Encryption: two way function to recover original plaintext password using key
18
Q

Password policies(6)

A
  1. Set a password for attacker to guess
  2. Change default password
  3. Avoid guessable passwords: min length, variety
  4. Password ageing: expiry dates + prevent reuse of passwords
  5. Limit login attempts
  6. Inform user of last login time and number of failed logins since then
19
Q

One Time Password Overview + 1+ve

A

+ve: tackles issue where stolen passwords reused
- generates list of passwords where each password only used once
- Lamport’s OTP: one way function to generate password possibilities

20
Q

Protecting password file + methods(3)

A

OS has file with usernames and passwords
1. Cryptographic protection
2. Access Control
3. Combination of above

21
Q

Failure Rates

A
  • measure of similarity between reference features and current features
  • user accepted if match above a threshold
    i) False positive: accept wrong user
    ii) False Negative: reject legit user, embarrassment and reduced work efficiency
22
Q

Should you write passwords down?

A

You can then store in locked drawer BUT still vulnerable to keyloggers

23
Q

How to protect website’s security

A
  1. Ask own security team to test BUT depends on skillsets and possible internal conflicts
  2. Get experts in penetration testing BUT depends on skillsets, work commitment, work dedication and cost
  3. Open competition, talent from worldwide to fix bugs asap