Top Banner
Passwords Breaches, Storage, Attacks OWASP AppSec USA 2013
17

Passwords Breaches, Storage, Attacks

Feb 24, 2016

Download

Documents

medea

Passwords Breaches, Storage, Attacks. OWASP AppSec USA 2013. About Me. [email protected]. Password in the News. Understanding Password Threats. Online Attacks. Online Attacks Attackers interact with web interface via scripts & automation - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Passwords Breaches, Storage, Attacks

PasswordsBreaches, Storage, Attacks

OWASP AppSec USA 2013

Page 2: Passwords Breaches, Storage, Attacks

About Me

[email protected]

Page 3: Passwords Breaches, Storage, Attacks

Password in the News

Page 4: Passwords Breaches, Storage, Attacks

UNDERSTANDING PASSWORD THREATS

Page 5: Passwords Breaches, Storage, Attacks

Online Attacks

• Online Attacks

• Attackers interact with web interface via scripts & automation

• Defenses Available: Account Lockout, Attacker Profiling, Anti-

automation

• Example Online Attacks

• Password Brute Force - 4 variations

• Credential Stuffing - (Reuse of compromised passwords)

• Account Lockout

Page 6: Passwords Breaches, Storage, Attacks

Offline Attacks

• Offline Attacks

• Attackers have password hashes and are performing attacks against

file

• Defenses Available: Only the strong hashing algorithm you selected

• Example Offline Attacks

• Hash brute force - dictionary or iterative

• Rainbow tables

Page 7: Passwords Breaches, Storage, Attacks

OFFLINE PASSWORD STORAGE

Page 8: Passwords Breaches, Storage, Attacks

Password Storage

• Bad Approaches• Your own algorithm

• md5

• sha1

• encryption

• base64 encoding

• rot 13

• Good Approach• Bcrypt

• Scrypt

• PBKDF2

+ Per user salt

Page 9: Passwords Breaches, Storage, Attacks

ADDITIONAL ATTACKS

Page 10: Passwords Breaches, Storage, Attacks

Denial of Service

Denial of Service (DOS)

Distributed Denial of Service (DDOS)

Page 11: Passwords Breaches, Storage, Attacks

Denial of Service

Page 12: Passwords Breaches, Storage, Attacks

DDOS Comparisons

Traditional Network DDOS

• overwhelms target with volume

• exhausts bandwidth / capacity of

network devices

• Requires large number of machines

• Defenses: CDN, anti-DDOS services

Application Abuse DOS

• invokes computationally intense

application functions

• exhausts CPU / memory of web servers

• Requires few machines

• Defenses: Few available, must

customize

Page 13: Passwords Breaches, Storage, Attacks

Credential Stuffing

Account Take Over - Credential Stuffing

Page 14: Passwords Breaches, Storage, Attacks

Distributed App Lock Out

Distributed App Lock Out

Page 15: Passwords Breaches, Storage, Attacks

Service Desk Overload

Service Desk Overload

Page 16: Passwords Breaches, Storage, Attacks

Take Aways

• Password Hashing– Don’t get breached - Defense in depth– Don’t exacerbate breach – use correct hashing

• Online Attacks– Prepare for automated attacks– Different attacks and motivation from Criminal

Enterprises, Hacktivism, Nation State, etc

Page 17: Passwords Breaches, Storage, Attacks

Thanks!

[email protected]://michael-coates.blogspot.com

@_mwc