
10.4 INTRUSION PREVENTION 383
10.6 CRACKING A PASSWORD
TECHNICAL
FOCUS
To crack Windows passwords, you just need to get
a copy of the security account manager (SAM) file in
the WINNT directory, which contains all the Windows
passwords in an encrypted format. If you have phys-
ical access to the computer, that’s sufficient. If not,
you might be able to hack in over the network. Then,
you just need to use a Windows-based cracking tool
such as LophtCrack. Depending on the difficulty of
the password, the time needed to crack the password
via brute force could take minutes or up to a day.
Or that’s the way it used to be. Recently the
Cryptography and Security Lab
in Switzerland devel-
oped a new password-cracking tool that relies on
very large amounts of RAM. It then does indexed
searches of possible passwords that are already in
memory. This tool can cut cracking times to less than
1/10 of the time of previous tools. Keep adding RAM
and mHertz and you could reduce the crack times to
1/100 that of the older cracking tools. This means that
if you can get your hands on the Windows-encrypted
password file, then the game
is over.
It can literally
crack complex passwords in Windows in seconds.
It’s different for Linux, Unix, or Apple comput-
ers. These systems insert a 12-bit random ‘‘salt’’ to
the password, which means that cracking their pass-
words will take 4,096 (2
∧
12) times longer to do. That
margin is probably sufficient for now, until the next
generation of cracking tools comes along. Maybe.
So what can we say from all of this? That you are
4,096 times safer with Linux? Well, not necessarily.
But what we may be able to say is that strong pass-
word protection, by itself, is an oxymoron. We must
combine it with other methods of security to have
reasonable confidence in the system.
these actions do not replace the need to notify network managers about an employee’s
departure as part of the standard Human Resources procedures.
Gaining access to an account can be based on something you know, something
you have, or something you are.
Passwords The most common approach is something you know, usually a password.
Before users can log-in, they need to enter a password. Unfortunately, passwords are often
poorly chosen, enabling intruders to guess them and gain access. Some organizations are
now requiring that users choose passwords that meet certain security requirements, such
as a minimum length or including numbers and/or special characters (e.g., $, #, !). Some
have moved to passphrases which, as the name suggests, is a series of words separated
by spaces. Using complex passwords and passphrases has also been called one of the
top five least effective security controls because it can frustrate users and lead them to
record their passwords in places from which they can be stolen.
Access Cards Requiring passwords provides, at best, midlevel security (much like
locking your doors when you leave the house); it won’t stop the professional intruder,
but it will slow amateurs. Nonetheless, most organizations today use only passwords.
About a third of organizations go beyond this and are requiring users to enter a password
in conjunction with something they have, an access card. A smart card is a card about
the size of a credit card that contains a small computer chip. This card can be read by
a device and in order to gain access to the network, the user must present both the card
and the password. Intruders must have access to both before they can break in. The best
example of this is the automated teller machine (ATM) network operated by your bank.