passwords Flashcards

(15 cards)

1
Q

Why shouldn’t passwords be stored in plaintext?

A

If a plaintext password file is accessed or leaked, all user credentials are exposed. Instead, cryptographic hash functions should be used to store only hashed passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is CWE-260 and how is it relevant?

A

CWE-260 refers to storing cleartext passwords in memory or files. It’s a known security weakness and has been found even in products by experienced cybersecurity vendors like SonicWall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How should passwords be stored securely?

A

Use a cryptographic hash function to store H(password). For added protection, include a user-specific salt: store H(password, salt), which helps defend against dictionary and rainbow table attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of salting a password before hashing?

A

Salting ensures that identical passwords result in different hashes, making precomputed attacks (like rainbow tables) ineffective and forcing attackers to compute each hash individually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do brute-force capabilities compare between basic and complex passwords?

A

Simple 8-character lowercase passwords can be cracked in seconds using GPUs. More complex character sets and longer lengths increase cracking time significantly, though still feasible without strong hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a major risk with password reuse?

A

If the same password is used across accounts, a breach in one system can compromise all others. This has led to massive credential stuffing attacks using millions of leaked credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is frequent password changing no longer recommended?

A

NIST guidelines discourage frequent mandatory changes as it leads to predictable behavior like incremental updates. Instead, focus on strong, unique passwords and change only if a compromise is suspected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some issues with password managers and websites?

A

Password managers struggle with some web authentication features, and many websites don’t implement forms cleanly or follow standards, leading to insecure or unusable password autofill.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Kerckhoff’s principle in password hashing?

A

It states that a system’s security should not depend on secrecy of the algorithm. Instead, only the key (password) must be secret. Therefore, hashing functions must be secure even if known publicly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the benefit of upgrading password hashing schemes?

A

New schemes are more resistant to current attack methods. A safe upgrade involves using flags to identify hashing methods and migrating hashes during logins or via password resets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What role do salts and CSPRNGs play in password hashing?

A

Salts make each hash unique per user. Cryptographically Secure Pseudo-Random Number Generators (CSPRNGs) ensure salts are unpredictable, preventing targeted attacks and improving overall security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three main types of MFA factors?

A
  1. Something you know (password), 2. Something you have (phone, token), 3. Something you are (biometrics). Using more than one creates multi-factor authentication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the difference between SMS-based and app-based 2FA?

A

SMS relies on phone numbers, making it vulnerable to SIM-swapping. App-based 2FA relies on device ownership, making it generally more secure as it avoids telecom infrastructure vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is voice biometrics not recommended?

A

Voice can be recorded or synthesized, making it vulnerable to spoofing. Studies show AI-generated voices and phishing can easily bypass voice authentication systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How have fingerprint scanners been bypassed?

A

Researchers have used 3D printing and AI-generated ‘masterprints’ to spoof fingerprint readers, successfully defeating security in many consumer devices, especially with low FMR thresholds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly