Get Started. It's Free
or sign up with your email address
Rocket clouds

1. Rules of password

1.1. Designed to be something an individual can remember easily and not easy to guessed or broken.

1.2. Example

1.2.1. Numbers

1.2.2. Letters

1.2.3. all upper- or lowercase

1.2.4. Proper names

1.2.5. Dictionary words

1.2.6. Short password(fewer than eight characters)

1.3. Rules for creating a strong password(avoid)

1.3.1. Contain letters, special characters, and numbers: [email protected]

1.3.2. Passwords that contain only numbers: 23698217

1.3.3. Passwords that contain only special characters: &*#@!(%)

1.3.4. Passwords that contain letters and numbers: meetl23

1.3.5. Passwords that contain only letters: POTHMYDE

1.3.6. Passwords that contain only letters and special characters: [email protected]&ba

2. Types of password attacks

2.1. a. Passive online attacks

2.1.1. A passive online attack, the attacker tends to be not engaged or less engaged than they would be during other kinds of attacks.

2.2. b. Active online attacks

2.2.1. These attacks use a more aggressive form of penetration that is designed to recover passwords.

2.2.2. Examples: Using password guessing, Trojans, Spyware, Hash Injection and Keyloggers

2.3. c. Offline attacks

2.3.1. Offline attacks represent yet another form of attack that is very effective and difficult to detect in many cases.

3. Manual password cracking

3.1. a. Default passwords

3.1.1. Set by the manufacturer when the device or system is built.

3.1.2. They are documented and provided to the final consumer of the product and are intended to be changed.

3.1.3. Look up your default password at any of the sites: ■ | Suspicion Breeds Confidence ■ ■ ■

3.2. b. Guessing passwords

3.2.1. an attacker may target a system by doing: 1. Locate a valid user. 2. Determine a list of potential passwords. 3. Rank possible passwords from least to most likely. 4. Try passwords until access is gained or the options are exhausted.

4. Attacks that can be used to gain password

4.1. a. Redirecting SMB Logon to attacker

4.1.1. SMB stands for Server Message Block, and is a protocol for sharing files, printers, serial ports, and communications abstractions such as named pipes and mail slots between computers.

4.1.2. While SMB password guessing is still the most effective method for gaining access to Windows systems, an unsuccessful attacker might attempt to eavesdrop on SMB logon exchanges / authentication using sniffing techniques.

4.2. b. SMB relay MITM

4.2.1. Computer programs that can be used to carry out SMB man-in-the-middle (mitm) attacks on Windows machines.

4.3. c. NetBIOS DOS attack

4.3.1. The Network Basic Input/Output System (NetBIOS) attack are all new reflection attack vectors that abuse UDP.

4.3.2. The victim could be any device on the Internet that exposes a reflectable UDP service.

4.3.3. For malicious actors looking to bring a website or web service offline, distributed reflection denial of service (DrDoS) attacks have been a popular weapon for years.

5. Password cracking attacks using tool such as Hydra

5.1. What is hydra?

5.1.1. Hydra is a very well-known and respected network log on cracker (password cracking tool) which can support many different services.

5.2. How does Hydra work?

5.2.1. Hydra is a brute force password cracking tool. In information security (IT security), password cracking is the methodology of guessing passwords from databases that have been stored in or are in transit within a computer system or network.

6. Password cracking countermeasures

6.1. The first best counter measure against password cracking is using strong password.

6.2. Possible strong password should be implemented to protect you against password cracking.

6.3. Network Administrator must use “syskey” feature to protect password database.

6.4. Network administrator can enable syskey feature by any of following ways.

7. Performs privilege escalation

7.1. Privilege escalation.

7.1.1. One of the tactics that hackers use to gain unauthorized access to a network is known as privilege escalation.

7.1.2. There are two common types of privilege escalation — horizontal and vertical. Horizontal Occurs when a malicious user attempts to access resources and functions that belong to peer users, who have similar access permissions. Vertical Occurs when a malicious user attempts to access resources and functions that belong to a user with higher privileges, such as application or site administrators.

7.2. Rootkits.

7.2.1. The term ‘rootkit’ originated in the UNIX world; however, today it’s often used to describe stealth technologies utilized by the authors of Windows Trojans.

7.3. Rootkits countermeasures.

7.3.1. In order to do this, executable system files (such as login, ps, ls, netstat etc) or system libraries (libproc.a) are replaced, or a kernel module is installed.

8. Perform System Attack

8.1. Hiding files purpose and the techniques.

8.2. NTFS file streaming.

8.3. NTFS countermeasures.

8.4. Steganography technologies.

8.5. Buffer overflow attack.

9. Perform System Attack

9.1. Hiding files purpose and the techniques

9.1.1. There are two ways to hide files in Windows. The first is to use the attrib command. To hide a file with the attrib command, type the following at the command prompt: attrib +h [file/directory]

9.2. NTFS file streaming

9.2.1. The second way to hide a file in Windows is with NTFS alternate data streaming.

9.3. NTFS countermeasures

9.3.1. To delete a stream file, copy the first file to a FAT partition, and then copy it back to an NTFS partition.

9.4. Steganography technologies

9.4.1. used to conceal information inside of other information, thus making it difficult to detect.

9.5. Buffer overflow attack

9.5.1. A buffer is a temporary area for data storage.