Password Cracking
Password Cracking
Password is like a key to get an entry into computerized systems like a lock.
Password cracking is a process of recovering passwords from data that have been stored
in or transmitted by a computer system.
Usually, an attacker follows a common approach – repeatedly making guesses for
the password.
The purpose of password cracking is as follows:
1. To recover a forgotten password.
2. As a preventive measure by system administrators to check for easily crackable
passwords.
3. To gain unauthorized access to a system.
Manual password cracking is to attempt to logon with different passwords. The attacker
follows the following steps:
Find a valid user account such as an Administrator or Guest;
2. create a list of possible passwords;
3. rank the passwords from high to low probability;
4. key-in each password;
5. try again until a successful password is found.
Passwords can be guessed sometimes with knowledge of the user’s personal
information. Examples of guessable passwords include:
1. Blank (none);
2. the words like “password,” “passcode” and “admin”;
3. series of letters from the “QWERTY” keyboard, for example, qwerty, asdf or
qwertyuiop;
user’s name or login name;
5. name of user’s friend/relative/pet;
6. user’s birthplace or date of birth, or a relative’s or a friend’s;
7. user’s vehicle number, office number, residence number or mobile number;
8. name of a celebrity who is considered to be an idol (e.g., actors, actress, spiritual gurus)
by the user;
An attacker can also create a script file (i.e., automated program) which will be executed
to try each password in a list.
This is still considered manual cracking, is time-consuming and not usually effective.
Passwords are stored in a database and password verification process is established into
the system when a user attempts to login or access a restricted resource.
To ensure confidentiality of passwords, the password verification data is usually
not stored in a clear text format.
For example, one-way function (which may be either an encryption function
or a cryptographic hash) is applied to the password, possibly in combination with other
data, and the resulting value is stored.
When a user attempts to login to the system by entering the password, the same function
is applied to the entered value and the result is compared with the stored value. If they
match, user gains the access; this process is called authentication.
Comments
Post a Comment