"using an enhanced dictionary to facilitate auditing techniques related to brute force ssh and...

16
"Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

Upload: avis-mclaughlin

Post on 06-Jan-2018

216 views

Category:

Documents


3 download

DESCRIPTION

Overview Accounts Audits on Accounts Dictionary Attacks Focus on Username vs. Password Dictionary creation for username emphasis Distributed attack scenario

TRANSCRIPT

Page 1: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

"Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH

and FTP Attacks"

Ryan McDougallSt. Cloud State University

E-mail: [email protected]

Page 2: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

About Me

• SCSU Student• Student Network Administrator for Computer

Networking Department• Research Assistant in Business Computing

Research Lab

Page 3: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

Overview

• Accounts• Audits on Accounts• Dictionary Attacks• Focus on Username vs. Password• Dictionary creation for username emphasis• Distributed attack scenario

Page 4: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

Accounts

• Username• Password (Security Control)Passwords are a security control to prevent unauthorized access.

Page 5: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

Auditing

Account auditing (in IT Security) is the proactive evaluation of the security controls in place to protect the accounts from unauthorized access.

How can you audit?

Page 6: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

Dictionary Attacks

• Guessing possible user name and password combinations.

• Usually achieved by utilities that try numerous amounts of times (THC Hydra)

• Use compilations of user names and passwords (dictionaries).

Page 7: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

Dictionary Creation

• Commonly, when dictionaries are created, there tends to be more emphasis on passwords with common usernames

• Username vs. Password emphasis• Rockyou.com incident– A breach led to the release of 32 million

passwords.

Page 8: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

Rockyou.com Incident

http://www.imperva.com/docs/WP_Consumer_Password_Worst_Practices.pdf

Page 9: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

Rockyou.com Incident“If a hacker would have used the list of the top 5000 passwords as a dictionary

for brute force attack on Rockyou.com users, it would take only one attempt (per account) to guess 0.9% of the users passwords or a rate of one success per 111 attempts. Assuming an attacker with a DSL connection of 55KBPS upload rate and that each attempt is 0.5KB in size, it means that the attacker can have 110 attempts per second. At this rate, a hacker will gain access to one new account every second or just less than 17 minutes to compromise 1000 accounts.”

Page 10: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

Dictionary Creation

• Considering the Rockyou.com incident, there is reason to believe it might be more efficient to use dictionaries that put heavy emphasis on usernames.

• We can write a simple program, which I choose to write in C++.

Page 11: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:
Page 12: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

Dictionary Creation

• This program takes input files and uses nested for loops and arrays of records to piece the username dictionaries together.

• The output with this proof of concept is in the format (x1y1y2y3…yn) where x is the first letter of a first name and y1-yn are the characters that make up a last name.

• This can be easily adjusted for different user name formats.

Page 13: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

Sample Output

***This only shows a small section of the ‘a’ first name combinations***

Page 14: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

Distributed Attack Scenario

Page 15: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

Distributed Attack Scenario

• A distributed method will provide a more efficient attack.

• Dictionaries are divided up between attackers using ‘chunking’.

• May aid in avoiding security controls put in place to ban accounts/IP addresses.

Page 16: "Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University E-mail:

Q/A

• Any questions?