Windows AuthenticationDescriptionThe most common password vulnerabilities:Three Windows Authentication Algorithms:Weakness of LM Hashes:Operation Systems AffectedHow to Protect Against ItBibliographic ReferenceThank YouWindows AuthenticationWindows AuthenticationWenqun LiMach 24, 2004March 24, 2004 2DescriptionDescriptionMost forms of user authentication rely on user supplied passwords.Properly authenticated access is often not logged.A compromised password offers the attacker an opportunity to access a system from inside virtually undetected.Account with bad or empty passwords are extremely common,March 24, 2004 3The most common password vulnerabilities:The most common password vulnerabilities:User accounts with weak or nonexistent passwordsFail to protect passwordsAdministrative accounts with weak or nonexistent passwordsPassword hashing algorithms are knownMarch 24, 2004 4Three Windows Authentication Algorithms:Three Windows Authentication Algorithms:LM (least secure, most compatible)NLMNTLMv2 (most secure, least compatible)March 24, 2004 5Weakness of LM Hashes:Weakness of LM Hashes:Passwords are truncated to 14 characters.Passwords are padded with spaces to become 14 characters.Passwords are converted to all upper case characters.Passwords are split into two seven character pieces.March 24, 2004 6Operation Systems AffectedOperation Systems AffectedAll microsoft windows operating systems.An example – CVE-0222•The installation for Windows 2000 does not activate the administrator password until the system has rebooted, which allows remote attackers to connect to the ADMIN$ share without a password until the reboot occurs.March 24, 2004 7How to Protect Against ItHow to Protect Against ItAssure that passwords are consistently strongProtect strong passwordsTightly control accountsMaintain strong password policy for the enterprise. Disable LM authentication across the network.Prevent the LM hash from being storedPrevent password hashes and SAM database from be being copied.March 24, 2004 8Bibliographic ReferenceBibliographic ReferenceI. http://www.sans.org/top20/#w3II. http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2000-0222March 24, 2004 9Thank YouThank YouAny
View Full Document