Til hovedinnhold
Norsk English

All in a day's work: Password cracking for the rest of us

Sammendrag

The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems. Additionally, some of the most popular operating systems such as Windows XP, Windows Vista and the upcoming Windows 7, still use ad-hoc constructed hash functions such as LM, while many Linux variants use the broken hash function MD5. This paper describes an experiment where we have tested the strengthof a selection of passwords when converted to LM, NT and MD5 hashes, respectively, using commonly available tools. Our conclusion is that a large number of passwords can be cracked within a normal working day, and that all LM hash passwords can be recovered before morning coffee. The use of such weak hash functions in the process of user authentication in these operating systems poses a significant threat to an organization's security.
Les publikasjonen

Kategori

Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

Språk

Engelsk

Forfatter(e)

Institusjon(er)

  • Norges teknisk-naturvitenskapelige universitet
  • SINTEF Digital / Software Engineering, Safety and Security

År

2009

Forlag

Tapir Akademisk Forlag

Bok

Norsk informasjonssikkerhetskonferanse : NISK 2:2009 : NTNU, Trondheim 24.-25. november 2009

ISBN

978-82-519-2492-4

Side(r)

69 - 83

Vis denne publikasjonen hos Cristin