access control and password management

25
FORESEC Academy ACCESS CONTROL AND PASSWORD MANAGEMENT FORESEC Academy Security Essentials (II)

Upload: grant

Post on 24-Feb-2016

63 views

Category:

Documents


0 download

DESCRIPTION

FORE SEC Academy Security Essentials (II ). Access Control and Password Management. Agenda. Access Control - Techniques - Models Passwords - Password Cracking - Password Management. Key Terms & Principles. Data Owner Data Custodian Separation of duties Least Privilege. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Access  Control and  Password Management

FORESEC Academy

ACCESS CONTROL AND PASSWORDMANAGEMENT

FORESEC Academy Security Essentials (II)

Page 2: Access  Control and  Password Management

FORESEC Academy Agenda

Access Control- Techniques

- Models Passwords

- Password Cracking- Password Management

Page 3: Access  Control and  Password Management

FORESEC Academy

Key Terms & Principles

Data Owner

Data Custodian

Separation of duties

Least Privilege

Page 4: Access  Control and  Password Management

FORESEC Academy

Access Control Techniques

Discretionary (DAC) Mandatory (MAC) Role-based Rule-based List-based Token-based

Page 5: Access  Control and  Password Management

FORESEC Academy Lattice Techniques

Access Matrix- Objects- Subjects

Bell-LaPadula Biba Clark-Wilson

Page 6: Access  Control and  Password Management

FORESEC AcademyLattice Techniques (2)

Bell-LaPadula Designed for Military

Environment Address only Confidentiality Rules

- Simple Security Property - Star Property (* Property) - Strong Star Property

Page 7: Access  Control and  Password Management

FORESEC AcademyLattice Techniques (3)

Biba Model for Integrity Suited for Commercial Environment Rules

- Simple Integrity Property- Integrity Start Property

Information only flow downwards

Page 8: Access  Control and  Password Management

FORESEC AcademyLattice Techniques (4)

Clark-Wilson Integrity Model Use an access triple

- Subject, Program, Object Prevent loss or corruption of data Ensure well formed transactions

Page 9: Access  Control and  Password Management

FORESEC Academy

Access Management

Account administration Maintenance Monitoring Revocation

Page 10: Access  Control and  Password Management

FORESEC AcademyAccess Control Models

State machine Information flow Covert channels Non-interference

Page 11: Access  Control and  Password Management

FORESEC Academy Protocols

Password Authentication Protocol (PAP)

Challenge Handshake Authentication Protocol (CHAP)

Page 12: Access  Control and  Password Management

FORESEC Academy Centralized Control

TACACS RADIUS Domains & Trusts Active Directory Kerberos

Page 13: Access  Control and  Password Management

FORESEC Academy Access Control:

Biometrics Hand: Fingerprint, hand geometry Eye: retina, iris Face: Thermograms, Photo Voice print Mannerisms: keystroke, tread,

handwriting

Page 14: Access  Control and  Password Management

FORESEC AcademyAccess Control: Biometrics (2)Key factors in selecting biometrics: Reliability

- FRR, FAR, CER, EER User friendliness Cost

Page 15: Access  Control and  Password Management

FORESEC AcademySingle Sign-On (SSO)

User only have to log on once Credentials are carried with user Simplifies User management Allow centralized management User only has to remember one set

of credentials

Page 16: Access  Control and  Password Management

FORESEC Academy Single Sign-On (2)

Can take different forms:- Scripts- Directory Services- Kerberos- Thin Clients

Security Issues Interoperability Issues

Page 17: Access  Control and  Password Management

FORESEC AcademyAccess Control: Passwords

Page 18: Access  Control and  Password Management

FORESEC Academy What is Password

Cracking?Discovering a plan text password given an encrypted

password.

Page 19: Access  Control and  Password Management

FORESEC Academy

Methods of Password Cracking

Dictionary attack

Hybrid attack

Brute force attack

Page 20: Access  Control and  Password Management

FORESEC Academy

Unix Password Cracking - Crack

Name: Crack Operating System: Unix Brief Description: Crack is a

"password guessing" program that is designed to quickly identify accounts having weak passwords given a Unix password file.

Page 21: Access  Control and  Password Management

FORESEC Academy Crack

Available from ftp://ftp.cerias.purdue.edu/pub/tools/unix/pwdutils/crack

Features - Configurable password cracking

- Modular approach with various scripts

- Combining and extracting password files

- Works with any crypt() implementation

Page 22: Access  Control and  Password Management

FORESEC Academy Configuring Crack

Download Crack file Unzip the file using gzip - gunzip -r crack5.0.tar.gz Untar the file

- tar -xvf crack5.0.tar Read manual.txt Edit the script file Compile program

- Crack -makeonly - Crack -makedict

Page 23: Access  Control and  Password Management

FORESEC Academy Running Crack

Run Crack with a password file- Crack [options] [-fmt format] [file ...]- Crack myfile

Pipe output to a file- Crack myfile > output

Run Reporter script to see results- ./Reporter [-quiet] [-html]

Page 24: Access  Control and  Password Management

FORESEC AcademyEffectiveness of Crack

User Eric password eric – CRACKED User John password john1234 User Mike password 5369421 User Mary password #57adm7# User Sue password sue – CRACKED User Lucy password 12345 – CRACKED User Pat no password – CRACKED User Tim password password – CRACKED User Cathy password 55555 – CRACKED User Frank password abcde – CRACKED User Tom password mnopqr User Karen password bbbbbbbb - CRACKED

Page 25: Access  Control and  Password Management

FORESEC AcademyHow to Protect Against it

Enforce a strong password policy Use shadow passwords Use one-time passwords Use passwd to enforce strong

passwords