Passwords, passwords, and more passwords; this is normally the subject that websites, technology help staff, network administrators, and other computer related experts will harp on the most. I am sure you have seen it at some point, all online accounts and most computer accounts require passwords. Those annoying messages that your password does not meet the complexity requirements. To most people
Brute-force attacks are one of the oldest forms of attacking a password and is still effectively used to this day. Brute-force attacks are also known as exhaustive key search attacks since this attack is so simple, it can be used to target any form of protected data. This technique is so versatile because it works by processing and calculating every single possible combination and testing it to see if it is the correct combination. The process starts off by doing one character with every possible combination of letters, symbols, or numbers. Next the same process for two characters, then three characters and it keeps building upwards. Now I know what you are thinking, this sounds really time-consuming. You are right, if it were a human was doing this process, it would take a very long time. However, with the power of computers and automation, the invader can carry out this attack quickly and effectively. Simple utilities like John the Ripper are capable of carrying out hundreds to thousands of password attempts a second. Not only that but cybercriminals truly have all the time they need to attempt to crack a password because the reality is the user will most likely not make an attempt to change the password until it is too late.
The next form of attack is simply an improvement upon brute-force. It is called a dictionary attack. A dictionary attack is a brute-force attack that uses a list of words and password combinations. It then applies every single word in the dictionary in an attack against your password, looking again for a correct match. Even more advanced dictionary attacks will take words from the dictionary and apply common password conventions to them, for example throwing numbers or birth dates on the end of words. It’s a given that the entire actual Webster’s dictionary is included in these dictionary attacks but also cybercriminals will include password lists from websites and data breaches to the list as well. I have seen a password list for dictionary attacks that contained over 982 million combinations.
The final commonly implemented style of attack is called a rainbow table. This style of attack is more complex. For the purpose of this blog post I will keep my explanation relatively simple, for those looking for more a more in-depth explanation, please refer to this article from Andy O'Donnell of Lifewire. Encryption is used to protect passwords from being readable to the human eye, it takes a password of “example” and turns it into “1a79a4d60de6718e8e5b326e338ae533”. This new form of the encrypted password would be called a password “hash”, hashes are designed to not be easily reversible in case they are ever stolen. A rainbow table is basically a large dictionary but instead of having words, it contains pre-calculated hashes that refer to actual passwords. This way an attacker just has to submit the hash to the rainbow table, look for a match and then simply obtain the password.
These are some common forms of attacks that cybercriminals will attempt to launch against your password. Greg Edwards points out possible remediations in Passwords, Passwords, Everywhere. At WatchPoint Data, we not only help secure your endpoints and network, but we will also help with education on cyber security. We will help you create strong password policies and educate users on the importance of complex passwords. A helpful password checking utility that I recommend to clients is the Kaspersky password checker. It is not only entertaining but very accurate on how secure a possible password may be. I would advise you to enter a possible password you would use, and see how secure you are. I challenge you to create a password that would take multiple years to crack, if not longer.
With WatchPoint's Security Solution you will: