T3 Flashcards

1
Q

What is the goal of the T3 tutorial?

A

To demonstrate how a dictionary attack can break symmetric encryption

  • Using openSSL
  • Knowing cipher and parameters used
  • Assume attacker intercepted encryption message
  • Assume password is word in italian dictionary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the role of SHA-512 in the T3 tutorial?

A

It is used as the hashing algorithm to derive the encryption key from the password (key derivation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does iter -1 imply for key derivation with SHA-512

A

encryption faster, but brute force attack is easier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the -iter 1 flag do?

A

Specifies the number of iterations the key derivation function performs, in this case hashing, only once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens during a dictionary attack?

A

Each word in the dictionary is tested as a password to decrypt the ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why do false positives occur during the attack?

A

OpenSSL doesn’t validate the decrypted plaintext’s meaning, but instead the length, so gibberish output may still be considered successful decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can false positives be mitigated?

A

By using heuristics, such as checking for printable characters or specific patterns in the decrypted output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What us GNU Parallel used for in the T3 turorial

A

To split the dictionary file into chunks and tests passwords in parallel across multiple CPU cores, speeding up brute-force attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How many scripts were tested in T3?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does the script check if a password is correct?

A

It uses OpenSSL to decrypt the ciphertext and checks for an error-free ouput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can dictionary attacks be made more efficient (3)?

A

Heuristics to reduce false positives
running attack in parallel
leveraging hardware acceleration (clusters,gpu)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a false negative in a dictionary attack?

A

When the correct password is in the dictionary but not identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why does this tutorial show the importance of strong passwords?

A

Weak passwords are easily guessed or brute-forced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

script 1 basic brute force attack result

A

many false positives returned because by default openssl only reports errors if decrypted message doesnt match length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

script 2 reduce false positives result

A

used heuristic algorithm that assumes message contains certain amount of consecutive letters. Reduces but doesn’t eliminate FP’s.

can u think of other contextual knowledge that could help???

This would not work for binary data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

script 3 speed up attack

A

use GNU parallel tool to run programs across cpu cores

modify script so there is main script controlloing satellite scripts

exploits “embarassingly parallel” nature of password trying attacks

17
Q

what further optimizations are possible?

A

hardware accelerated AES with modern cpus and gpus

deploy attack on cluster or cloud infrastructure

18
Q
A