CHAPTER 4: SYSTEM HACKING

Get Started. It's Free
or sign up with your email address
Rocket clouds
CHAPTER 4: SYSTEM HACKING by Mind Map: CHAPTER 4: SYSTEM HACKING

1. Password Cracking Techniques

1.1. Rules of password

1.1.1. A password is designed to be something an individual can remember easily but at the same time not something that can be easily guessed or broken.

1.1.2. Some examples of passwords that lend themselves to cracking:

1.1.2.1. ■ Passwords that use only numbers ■ Passwords that use only letters ■ Passwords that are all upper- or lowercase ■ Passwords that use proper names ■ Passwords that use dictionary words ■ Short passwords (fewer than eight characters)

2. Types Of Password Attacks

2.1. Passive online attacks

2.1.1. A passive online attack, the attacker tends to be not engaged or less engaged than they would be during other kinds of attacks

2.2. The rules for creating a strong password are a good line of defense against the attacks we will explore. Avoid the following:

2.2.1. ■ Passwords that contain letters, special characters, and numbers: [email protected] ■ Passwords that contain only numbers: 23698217 ■ Passwords that contain only special characters: &*#@!(%) ■ Passwords that contain letters and numbers: meetl23 ■ Passwords that contain only letters: POTHMYDE ■ Passwords that contain only letters and special characters: [email protected]&ba ■ Passwords that contain only special characters and numbers: [email protected]$4

2.3. Active Online Attacks

2.3.1. These attacks use a more aggressive form of penetration that is designed to recover passwords.

2.3.2. Examples: Using password guessing, Trojans, Spyware, Hash Injection and Keyloggers

2.4. Offline Attacks

2.4.1. Offline attacks represent yet another form of attack that is very effective and difficult to detect in many cases.

3. Manual Password Cracking

3.1. Default passwords

3.1.1. Set by the manufacturer when the device or system is built.

3.1.2. They are documented and provided to the final consumer of the product and are intended to be changed.

3.1.3. However, not all users or businesses get around to taking this step, and hence they leave themselves vulnerable.

3.2. Guessing passwords

3.2.1. Locate a valid user

3.2.2. Determine a list of potential passwords.

3.2.3. Rank possible passwords from least to most likely.

4. Attacks That Can Be Used To Gain Password

4.1. Redirecting Server Message Block (SMB) Logon to attacker

4.1.1. Eavesdropping on LM responses becomes much easier if the attacker can trick the victim to attempt Windows authentication of the attacker's choice.

4.1.2. Basic trick is to send an email message to the victim with an embedded hyperlink to a fraudulent SMB server.

4.1.3. When the hyperlink is clicked, the user unwittingly sends his credentials over the network.

4.2. SMB relay MITM

4.2.1. where the attacker asks the victim to authenticate to a machine controlled by the attacker, then relays the credentials to the target.

4.2.2. the attacker forwards the authentication information both ways, giving him access.

4.3. NetBIOS DOS attack

4.3.1. A NetBIOS denial-of-service (DoS) attack sends a NetBIOS Name Release message to the NetBIOS Name Service on a target Windows systems and forces the system to place its name in conflict so that the name can no longer be used. This essentially blocks the client from participating in the NetBIOS network and creates a network DoS for that system.

5. Password Cracking Attacks Using Tool Such As Hydra

5.1. password cracking countermeasures

5.1.1. The first best counter measure against password cracking is using strong password

5.1.2. Possible strong password should be implemented to protect you against password cracking.

5.2. Performs privilege escalation

5.2.1. Privilege escalation

5.2.1.1. types: horizontal and vertical

5.2.2. Rootkits.

5.2.3. Several types of rootkits

5.2.4. Rootkits countermeasures

5.3. Perform system attack

5.3.1. Hiding files purpose and the techniques

5.3.2. NTFS file streaming.

5.3.3. NTFS countermeasures

5.3.4. Steganography technologies.

5.3.5. Buffer overflow attack

6. Password Cracking Countermeasures

6.1. To protect against hashing of the algorithms for password stored on the server it should be physically isolated and even passwords should be salted (randomized).