Week 3
Week 3
Vulnerabilities
INF 203
Content
• Threats
• Vulnarabilities
• Attacks
• Phishing, Malware, Worms,
Ransomware, Spyware, Trojan
• Passwords attacks
• Examples weak passwords
• Password Managers
• Password attack tools
Threats
• Threat is a potential negative action or event facilitated by a vulnerability that
results in an unwanted impact on a router system or an application
Vulnerabilities
• Vulnerability is a weakness that can be exploited by an attacker
Attacks
• Attack is any attempt to expose, alter, disable, destroy, steal, or gain information
through unauthorized access to or make unauthorized use of an asset.
Type of threats
• Examples of dictionaries
- List of real words in any language
- Combinations of words
- Common passwords from public lists
Rainbow Table Attack
Passwords • - guest
• - etc.
- sandbags
- bunnyhop
- IntenseCrabtree
• Default passwords are supplied by the
system vendor (e.g., firewall, - etc.
modem) and meant to be changed at
installation time.
• Including words in non-
• Lists of default passwords are widely English dictionaries.
available on the internet.
• Words with numbers • Identifiers:
Examples of appended: - jsmith123
Weak - password1 - 1/1/1970
- deer2000
Passwords - john1234
- 555–1234
- one's username
- etc. - etc.
Passwords - etc.
- treetree
•• LastPass
•• BitWarden
•• iCloud KeyChain
Password Managers: How
Do They Work
• You keep in mind only one master password
- Then the system generates one different password for each
service
• Best if integrated with a Two-Factor Authentication (2FA),
such as:
- SMS text
- Google Authenticator
- YubiKey
Password attack tool
1. Hashcat 2. John the Ripper
Hashcat is one of the most popular and widely John the Ripper is a well-known free open-source
used password crackers in existence. It is password cracking tool for Linux, Unix and Mac OS
available on every operating system and X. A Windows version is also available.
supports over 300 different types of hashes. John the Ripper offers password cracking for a
Hashcat enables highly-parallelized password variety of different password types. It goes beyond
OS passwords to include common web apps (like
cracking with the ability to crack multiple
WordPress), compressed archives, document files
different passwords on multiple different
(Microsoft Office files, PDFs and so on), and more.
devices at the same time and the ability to
support a distributed hash-cracking system via A pro version of the tool is also available, which
overlays. Cracking is optimized with integrated offers better features and native packages for
target operating systems. You can also download
performance tuning and temperature
Openwall GNU/*/Linux that comes with John the
monitoring. Ripper.
Password attack tool
3. Brutus 4. Wfuzz
Brutus is one of the most popular remote online Wfuzz is a web application password-cracking tool like Brutus
that tries to crack passwords via a brute-force guessing attack. It
password-cracking tools. It claims to be the can also be used to find hidden resources like directories,
fastest and most flexible password cracking tool. servlets and scripts. Wfuzz can also identify injection
vulnerabilities within an application such as SQL injection, XSS
This tool is free and is only available for Windows injection and LDAP injection.
systems. It was released back in October 2000. Key features of the Wfuzz password-cracking tool include:
Injection at multiple points in multiple directories
Brutus supports a number of different
Output in colored HTML
authentication types. Post, headers and authentication data brute-forcing
It is also capable of supporting multi-stage Proxy and SOCK support, multiple proxy support
Multi-threading
authentication protocols and can attack up to
HTTP password brute-force via GET or POST requests
sixty different targets in parallel. It also offers the Time delay between requests
ability to pause, resume and import an attack. Cookie fuzzing
Password attack tool
5. THC Hydra 6. Medusa
THC Hydra is an online password-cracking tool that Medusa is an online password-cracking tool similar to
attempts to determine user credentials via brute-force THC Hydra. It claims to be a speedy parallel, modular
password guessing attack. It is available for Windows, Linux, and login brute-forcing tool. It supports HTTP, FTP, CVS,
Free BSD, Solaris and OS X. AFP, IMAP, MS SQL, MYSQL, NCP, NNTP, POP3,
THC Hydra is extensible with the ability to easily install new PostgreSQL, pcAnywhere, rlogin, SMB, rsh, SMTP, SNMP,
modules. It also supports a number of network protocols, SSH, SVN, VNC, VmAuthd and Telnet.
including Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, Medusa is a command-line tool, so some level of
CVS, Firebird, FTP, HTTP-FORM-GET, HTTP-FORM-POST,
HTTP-GET, HTTP-HEAD, HTTP-PROXY, HTTPS-FORM-GET,
command-line knowledge is necessary to use it.
HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTP-Proxy, Password-cracking speed depends on network
ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, NNTP, Oracle connectivity. On a local system, it can test 2,000
Listener, Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, passwords per minute.
POSTGRES, RDP, Rexec, Rlogin, Rsh, SAP/R3, SIP, SMB, SMTP, Medusa also supports parallelized attacks. In addition
SMTP Enum, SNMP, SOCKS5, SSH (v1 and v2), Subversion, to a wordlist of passwords to try, it is also possible to
Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP. define a list of usernames or email addresses to test
during an attack.
How to create a password that’s hard to crack What to avoid while selecting your password