GCGA Ch. 10 Understanding Password Attacks (ST) Flashcards

(8 cards)

1
Q

Password attacks

A

attempt to discover passwords. An online password attack attempts to discover a password from an online system. An offline password attack attempts to discover passwords from a captured database or captured packet scan. Passwords are often stored as a hash. Weak hashing algorithms are susceptible to collisions, which allow different passwords to create the same hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Brute force attack

A

attempts to guess all possible character combinations. Account lockout policies thwart online brute force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dictionary attack

A

uses all the words and character combinations stored in a file. Complex passwords thwart offline password attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spraying attack

A

attempts to bypass account lockout policies. An automated program starts with a large list of targeted user accounts. It then picks a password and tries it against every account in the list. It then picks another password and loops through the list again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pass the hash attack

A

In a pass the hash attack, the attacker discovers the hash of the user’s password and then uses it to log on to the system as the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Birthday attack

A

an attacker attempts to create a password that produces the same hash as the user’s actual password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password salting

A

adds additional characters to passwords before hashing them and prevents many types of attacks, including dictionary, brute force, and rainbow table attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key stretching techniques

A

Three commonly used key stretching techniques are bcrypt, Password-Based Key Derivation Function 2 (PBKDF2), and Argon2. They protect passwords against brute force and rainbow table attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly