Cloud GCP Storage
Cloud GCP Storage
Hash User ID
function
• Verifying a password
Storing Passwords Using Encryption
• It is also possible to protect secret
passwords by using reversible encryption
(e.g., using symmetric crypto)
• Still, password hashing is the most
prevalent/common method for storing
password
Can you see why?
Think about pros and cons of both
methods
Threats to Passwords
• Eavesdropping (insecure channel between
client and server)
• Login spoofing (human errors), shoulder
surfing, keyloggers
• Offline dictionary attacks
• Social engineering (human errors)
e.g., pretexting: creating and using an
invented scenario (the pretext) to persuade a
target to release information or perform an
action and is usually done over the telephone
• Online guessing (weak passwords)
Brute Force Attack Definition
• A brute force attack is a hacking method that uses trial and error
to crack passwords, login credentials, and encryption keys.
• It is a simple yet reliable tactic for gaining unauthorized access to
individual accounts and organizations’ systems and networks.
• The hacker tries multiple usernames and passwords, often using a
computer to test a wide range of combinations, until they find the
correct login information.
• The name "brute force" comes from attackers using excessively
forceful attempts to gain access to user accounts.
• Despite being an old cyberattack method, brute force attacks are
tried and tested and remain a popular tactic with hackers.
Types of Brute Force Attacks
Creating a Table
• Here, the hash of a string is taken and then reduced to create a
new string, which is reduced again, repeatedly.
• For example, let’s create a table of the most common
password, 12345678, using MD5 hash function on first 8
characters:
✓ First we take the string and pass it through md5 hash function.
hashMD5(12345678) = 25d55ad283aa400af464c76d713c07ad
✓ We reduce the hash by taking only the first 8 characters. Then, we re-hash it.
hashMD5(25d55ad2) = 5c41c6b3958e798662d8853ece970f70
✓ This is repeated until enough hashes in output chain.
This represents one chain, which starts from the first plain
text and ends at the last hash.
✓ After obtaining enough chains, we store them in a table.
Cracking the Password
• Starting off with the hashed
text (the password) is
checked if it exists in the
database.
• If so, go to the start of the
chain and start hashing until
there is a match.
• As soon as the match is
obtained, the process ceases
and the authentication is
cracked.
• The following flowchart
Advantages of Rainbow Table Attack