T3 Flashcards

1
Q

What is the goal of the T3 tutorial?

A

To demonstrate how a dictionary attack can break symmetric encryption by testing every password in a dictionary file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is symmetric encryption?

A

A type of encryption where the same key is used for encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is AES-256-CBC?

A

Symmetric encryption algorithm using a 256-bit key in Cipher Block Chaining (CBC) mode for secure data encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of SHA-512 in the T3 tutorial?

A

It is used as the hashing algorithm to derive the encryption key from the password (key derivation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the -iter 1 flag do?

A

Specifies the number of iterations the key derivation function performs, in this case hashing, only once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens during a dictionary attack?

A

Each word in the dictionary is tested as a password to decrypt the ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why do false positives occur during the attack?

A

OpenSSL doesn’t validate the decrypted plaintext’s meaning, so gibberish output may still be considered successful decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can false positives be mitigated?

A

By using heuristics, such as checking for printable characters or specific patterns in the decrypted output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What us GNU Parallel used for in the T3 turorial

A

To split the dictionary file into chunks and tests passwords in parallel across multiple CPU cores, speeding up brute-force attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many scripts were tested in T3?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does the script check if a password is correct?

A

It uses OpenSSL to decrypt the ciphertext and checks for an error-free ouput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can dictionary attacks be made more efficient (3)?

A

Heuristics to reduce false positives
running attack in parallel
leveraging hardware acceleration (clusters,gpu)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a false negative in a dictionary attack?

A

When the correct password is in the dictionary but not identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why does this tutorial show the importance of strong passwords?

A

Weak passwords are easily guessed or brute-forced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly