Top Banner
Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013
17

Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

Dec 28, 2015

Download

Documents

Georgiana Perry
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

PasswordsBreaches, Storage, Attacks

OWASP AppSec USA 2013

Page 2: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

About Me

[email protected]

Page 3: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

Password in the News

Page 4: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

UNDERSTANDING PASSWORD THREATS

Page 5: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

Online Attacks

• Online Attacks

• Attackers interact with web interface via scripts & automation

• Defenses Available: Account Lockout, Attacker Profiling, Anti-

automation

• Example Online Attacks

• Password Brute Force - 4 variations

• Credential Stuffing - (Reuse of compromised passwords)

• Account Lockout

Page 6: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

Offline Attacks

• Offline Attacks

• Attackers have password hashes and are performing attacks against

file

• Defenses Available: Only the strong hashing algorithm you selected

• Example Offline Attacks

• Hash brute force - dictionary or iterative

• Rainbow tables

Page 7: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

OFFLINE PASSWORD STORAGE

Page 8: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

Password Storage

• Bad Approaches• Your own algorithm

• md5

• sha1

• encryption

• base64 encoding

• rot 13

• Good Approach• Bcrypt

• Scrypt

• PBKDF2

+ Per user salt

Page 9: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

ADDITIONAL ATTACKS

Page 10: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

Denial of Service

Denial of Service (DOS)

Distributed Denial of Service (DDOS)

Page 11: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

Denial of Service

Page 12: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

DDOS Comparisons

Traditional Network DDOS

• overwhelms target with volume

• exhausts bandwidth / capacity of

network devices

• Requires large number of machines

• Defenses: CDN, anti-DDOS services

Application Abuse DOS

• invokes computationally intense

application functions

• exhausts CPU / memory of web servers

• Requires few machines

• Defenses: Few available, must

customize

Page 13: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

Credential Stuffing

Account Take Over - Credential Stuffing

Page 14: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

Distributed App Lock Out

Distributed App Lock Out

Page 15: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

Service Desk Overload

Service Desk Overload

Page 16: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

Take Aways

• Password Hashing– Don’t get breached - Defense in depth– Don’t exacerbate breach – use correct hashing

• Online Attacks– Prepare for automated attacks– Different attacks and motivation from Criminal

Enterprises, Hacktivism, Nation State, etc

Page 17: Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013.

Thanks!

[email protected]://michael-coates.blogspot.com

@_mwc