Chapter 11 - Authentication And Account Management Flashcards
Authentication
Proving that a user is genuine, and not an imposter.
Authentication credentials
1) what he has
2) what he is
3) what he knows
4) where he is
5) what he does
Online attack
An attempt to enter different passwords at the login prompt until the right password is guessed.
Offline attack
Stealing a message digest database and cracking it offline.
NTLM (New Technology LAN Manager) hash
A hash used by modern Microsoft Windows operating systems for creating password digests.
Pass the hash attack
An attack in which the user sends the hash to the remote system to then be authenticated on an NTLM system.
Mask attack
A more targeted brute force attack that uses placeholders for characters in certain positions of the password.
Rule attack
Conducts a statistical analysis on the stolen passwords that is then used to create a mask to break the largest number of passwords.
Dictionary attack
A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file.
Rainbow tables
Large pre-generated data sets of encrypted passwords used in password attacks.
Key stretching
A password hashing algorithm that requires significantly more time than standard hashing algorithms to create the digest.
2 popular key stretching password hash algorithms
1) bcrypt
2) PBKDF2
Multifactor authentication
Using more than one type of authentication credential.
Security token
A means of authentication based on a token that the user has.
Hardware security token
A small device (usually one that can be affixed to a keychain) with a window display.