Unformatted text preview:

Windows AuthenticationDescriptionThe most common password vulnerabilities:Three Windows Authentication Algorithms:Weakness of LM Hashes:Operation Systems AffectedHow to Protect Against ItBibliographic ReferenceThank YouWindows AuthenticationWindows AuthenticationWenqun LiMach 24, 2004March 24, 2004 2DescriptionDescriptionMost forms of user authentication rely on user supplied passwords.Properly authenticated access is often not logged.A compromised password offers the attacker an opportunity to access a system from inside virtually undetected.Account with bad or empty passwords are extremely common,March 24, 2004 3The most common password vulnerabilities:The most common password vulnerabilities:User accounts with weak or nonexistent passwordsFail to protect passwordsAdministrative accounts with weak or nonexistent passwordsPassword hashing algorithms are knownMarch 24, 2004 4Three Windows Authentication Algorithms:Three Windows Authentication Algorithms:LM (least secure, most compatible)NLMNTLMv2 (most secure, least compatible)March 24, 2004 5Weakness of LM Hashes:Weakness of LM Hashes:Passwords are truncated to 14 characters.Passwords are padded with spaces to become 14 characters.Passwords are converted to all upper case characters.Passwords are split into two seven character pieces.March 24, 2004 6Operation Systems AffectedOperation Systems AffectedAll microsoft windows operating systems.An example – CVE-0222•The installation for Windows 2000 does not activate the administrator password until the system has rebooted, which allows remote attackers to connect to the ADMIN$ share without a password until the reboot occurs.March 24, 2004 7How to Protect Against ItHow to Protect Against ItAssure that passwords are consistently strongProtect strong passwordsTightly control accountsMaintain strong password policy for the enterprise. Disable LM authentication across the network.Prevent the LM hash from being storedPrevent password hashes and SAM database from be being copied.March 24, 2004 8Bibliographic ReferenceBibliographic ReferenceI. http://www.sans.org/top20/#w3II. http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2000-0222March 24, 2004 9Thank YouThank YouAny


View Full Document

UHCL CSCI 5931 - Windows Authentication

Documents in this Course
Load more
Download Windows Authentication
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Windows Authentication and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Windows Authentication 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?