504.3 Flashcards
Password Spraying
Attackers choose a small number of potential passwords to try. They then spray these potential password guesses across a large number of account names and machines, hoping that one works.
THC Hydra
Online password guessing tool. Target a single username and password, list of usernames, or a list of passwords and usernames. Supports many different protocols: SSH, RDP, SMTP, SMB, VNC and more.
Credential Stuffing
An adversary will collect username and password lists from popular website breaches, merging them into a single file or other searchable index. Then, when the adversary has a target organization in their sights, they search the breached username and password list for their target organization, identifying valid usernames and passwords that worked for the breached site, and reuse that username and password against the target.
Password Guessing
Identify a valid user ID > Create list of possible passwords > Try typing in each password > If system allows you in, success > if not, try again
Bucket Finder
requires a wordlist and it will go off and check each word to see if that bucket name exists in the Amazon’s S3 system. Any that it finds it will check to see if the bucket is public, private or a redirect
gcpbucketbrute
identifies and enumerates permissions on google compute buckets. uses a permutation wordlist to create common variations on a single bucket name or searches all bucket names in a supplied file. does not download fles; use gsutil.
bucket squatting
an attacker may register a bucket that uses an organization name (or a similar) as part of a phishing attack or other social engineering engagement, or even reuse a bucket name where prior references still exist that point to a deleted bucket
netcat
a computer networking utility for reading from and writing to network connections using TCP or UDP.
client mode
starts a connection to a listening node ip and port.
listening mode
waits for connections on a specific port
Domain Password Audit Tool (DPAT)
An analysis tool to characterize password selection in your windows domain. Not a password cracker; it analyzes the cracked data stored in the POT file from John the Ripper and Hashcat to identify systemic problems in how users select their passwords.
LANMAN Hash
- The user’s password is restricted to a maximum of fourteen characters.
- The user’s password is converted to uppercase.
- The user’s password is encoded in the System OEM code page.
- This password is NULL-padded to 14 bytes.
- The “fixed-length” password is split into two 7-byte halves.
- These values are used to create two DES keys, one from each 7-byte half
- Each of the two keys is used to DES-encrypt the constant ASCII string “KGS!@#$%”,[Notes 2] resulting in two 8-byte ciphertext values
- These two ciphertext values are concatenated to form a 16-byte value, which is the LM hash.
- No salt
NT Hash
- ASCII password is converted to Unicode (if necessary)
- Unicode password is hashed using the MD4 function to create a 16 byte hash, which is then stored in SAM
- Case sensitivity is preserved
- Used if password is greater than 14 characters
- no salt
Salt
Adds entropy (randomness or lack of probability) to the password before hashing. Makes password cracking much more difficult
Rainbow Tables
Pre-calculate hashes and store them in tables for direct comparisons. Each password is generates a unique password hash value. For any given number of passwords (from a wordlist, or an exhaustive list of possible characters for a given character set and length) the attacker generates and stores the hashes such that they can look it up again later. Harder to use when a password Salt is included.