Who said password cracking is dead?
In a recent conference, I was privy to a insightful session on password cracking. No, not pass-the-hash, pass-the-ticket, token manipulation, or other high-tech techniques. Rather, just simple brute force hacks, with some twists. It reinforced what I have been teaching for years, which is that our passwords are nearly worthless. Let me explain.
Most organizations allow users to use weak and pathetic passwords. A typical password policy looks like this:
- Minimum password length: 6 to 10 characters
- Types of characters in the password: At least 3 or the 4 required (a, A, 1, $)
- Passwords are based on words, using character replacement.
- Passwords increment, i.e. Pa$$word1, Pa$$word2, Pa$$word3, etc.
- A password with less than 15 characters can use LM and NTLM hashes, which are easily cracked.
Ensure your end users don’t fall victim to password cracking. Create and enforce custom strong password policies in Active Directory. Try ADSelfService Plus | Download Free Trial
Comments