Week 7 - Authentication 2
Week 7 - Authentication 2
AUTHENTICATION, AUTHORISATION,
ACCOUNTING AND IDENTIFICATION
When user gives username: claiming identity (identification)
one sided is when one entity presents its credentials and the other
one verifies them to see if its accurate (eg. server sends
authentication credentials and client sees if it can trust it)
-google/Microsoft authenticator
Something you are:
-face recognition
-fingerprint
-Voice
-Iris
-Gait detection
-signature geometry
retinal scan
DISCUSS STRENGTHS AND LIMITATIONS OF
EACH FACTOR OF AUTHENTICATION
Something you know:
Hard to remember complex passwords
-Password-management software has three main functions
Prevents easy passwords Organizes and secures passwords Automates your
logins
Lockout Policy
Threshold • Max failed attempts
Duration • Time until unlock
Security questions: disable them
Something you have:
Tokens or Key Fobs : If attackers intercept number, it is not useful for
long
Smart cards =
Differential power analysis involves measuring precise time and
electrical current required for certain encryption or decryption
operations
This can be used to deduce on-chip private key used by public-key
algorithms, such as RSA
Some implementations of symmetric ciphers can be vulnerable to timing or
power attacks as well
Smart cards can be physically disassembled by using acid, abrasives,
solvents, or other technique to obtain unrestricted access to
microprocessor
Bruteforce:
Attacker won't know in advance what salt will be, so they can't
pre-compute lookup table or rainbow table
They then use the stolen hash to impersonate the user and access
systems/services.
Exploitation:
AUTHENTICATION SERVICES
Authentication Services: Kerberos
network authentication mechanism used within Windows Active Directory
domains and some UNIX environments known as realms
provides mutual authentication that can help prevent man-in-the-middle
attacks and uses tickets (capabilities)
- Key Distribution Center (KDC) issues ticket-granting ticket (TGT) in
which user can request service if user is authorized and can access
objects from service server
- Kerberos version 5 requires all systems to be synchronized and within
five minutes of each other, which supports timestamped tickets and
prevents replay attacks
Lightweight Directory Access Protocol (LDAP) specifies formats and
methods to query directories (object database)
IEEE 802.1X protocol is port-based authentication protocol
Provides authentication when user connects to specific access point or
in this context, logical port (wireless)
You can use 802.1X with wireless standards, such as Wi-Fi Protected
Access (WPA) and Wi-Fi Protected Access v2 (WPA2)
Extensible Authentication Protocol (EAP)
Extensible Authentication Protocol (EAP) is frequently used in wireless
networks and pointto-point connections
Framework for providing transport and usage of keying material and
parameters generated by EAP methods
EAP is not wire protocol, it only defines message formats
PAP/CHAP Authentication Protocols
PAP (Password Authentication Protocol) Passwords are sent in clear text
so PAP is rarely used today
CHAP (Challenge Handshake Authentication Protocol) CHAP uses handshake
process where server challenges client and client then responds with
appropriate authentication information
TRANSITIVE TRUST
Transitive trust is foundation for network security in Windows
client/server architecture Trust relationship flows throughout set of
domains, such as domain tree, and forms relationship between domain and
all other domains that trust that domain For example, if domain A trusts
domain B, and if domain B trusts domain C, then domain A trusts domain C
(transitive trust)
WINDOWS AUTHENTICATION
Security Account Manager (SAM) is database file in Windows XP, Windows
7, Windows 10 etc. that stores users' passwords and is used to
authenticate local and remote users
User passwords are stored in hashed format in registry hive either as LM
hash or as NTLM hash
File can be found in %SystemRoot%/system32/config/SAM and is mounted on
HKLM/SAM (registry)
UNIX AUTHENTICATION
Two files • Main password file (/etc/passwd) • Shadow password file
(/etc/shadow) • Both files contain user names, user IDs, home
directories etc., but only shadow password file contains hashed
passwords • Password file readable by all, shadow file readable only by
admin (root)
Pluggable Authentication Modules (PAM) handle authentication on Unix
Can authenticate using variety of services • Password file • LDAP •
Kerberos