Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Password Security :: passelc.txt

Password Selection




Password Selection
By: Netcrash

When I audit the security of a network, one of the first things that I do is look at
the password selection policy. Most good administrators have laid down strict
guidelines on the selection of passwords. Passwords are the forefront of network
security. Why bother putting a $50,000 firewall in place if the password could be
cracked in minutes by a 12 year old? We must take steps to improve network
security. A good way to do this is select better passwords.

Primary criterion for a good password is:

It must be at least 6 characters long preferably 8. Contain mixed case, numeric, and
symbolic characters. Privileged passwords should also include at least one
non-printable ASCII character. Recommended for administrators. Passwords should
be selected that are not easily linkable to the user. Example, user MaryAnn has her
password as MARY123. Passwords should be short enough so that the common user
is not required to write it down. Believe you me folks, written down passwords have
been the downfall of many systems.

Analysis on password selection:

Good passwords are a start, but they are not completely fool proof. A good hacker
can still find ways to bypass passwords. The company must put into place policy
that prevents “social engineering” of passwords. I have heard stories of hackers
calling into a company and posing as the administrator to gain privileged passwords.
Ideas for company wide policy include:

Users should not be permitted to write down their passwords anywhere. There
should be no hard copies of password and username listings posted ANYWHERE.
This is just asking for trouble. Passwords should not be recycled from one user to
another. This means that once a password has been used, it should not be used
again for several years. Some companies simply rotate their users through a static
list of passwords. All a hacker would have to do is acquire this listing and use it to
brute force the password of a privileged user. Users should be instructed to NEVER
under any circumstances give their passwords out to anyone over the phone, email
or chat. If it should become necessary to communicate this information, the
compromised passwords should be changed as soon as possible.

Upon the suspicion of passwords being compromised, the entire collection of
company passwords should be changed. This would limit the time that a hacker
would have to implement a backdoor into the system. The system should also be
checked for these back door programs. Go to a hacker site and download a password
list, run your company passwords against it and disallow the use of any password
found on the list. Remember that an ounce of prevention is worth a pound of cure.
The few minutes enforcing good passwords will save you possibly hundreds of hours
repairing damages caused by a malicious hacker.

This listing was taken from a popular hacker document on how to brute force a
password. Take heed of it and do not allow passwords like these to go on your
system!!!

1) Relating to the person's real name, in some form or the other

RealName: John Doe
PossiblePW: doe, johndoe,jdoe,jd,johnd,john doe, doejohn,

2) Relating to the person's handle, in some form or the other

Handle: Victim
PossiblePW: victim, vic, vict, etc.

3) A combination of the person's real name and handle, in some form or the other

RealName: John Doe
Handle: Victim
PossiblePW: johndoevictim, jdvictim, jdv, johnvictimdoe

4) A combination of the person's real name and handle, along with a friend's

real name, and maybe handle.
RealName: John Doe
Handle: Victim
Friend'sRealName: Harry Hailey
Friend'sHandle: Fuckup
PossiblePW: johndoevictimharryhaileyfucup, jdvhhf, jdvhhfup,

5) A person that the victim is interested in, e.g. a boy/girlfriend, someone

he/she has an eye for, etc.

RealName: John Doe
MateHopeful: Janet Dove
PossiblePW: janet, johndoeandjanetdove, j&j, etc.

6) A combination in some form of another of the person's phone number.

RealName: John Doe
PhoneNumber: 212-555-9099
PossiblePW: 9099, 2125559099, 5559099, 212, etc.

7) Name of BBS

RealName: John Doe
BBS Name: Crappy BBS
PossiblePW: crap, crappybbs, bbscrap, etc.

8) A combination of BBS name and user name, user data, etc.

RealName: John Doe
BBS Name: Crappy BBS
PossiblePW: crapjdoe, jdoecrap, johndoeatcrappybbs jd@cbbs

9) Mother's maiden name:

Real Name: John Doe
Mother's Maiden Name: Janet Ho
PossiblePW: johndoejanetho, janetho, ho, etc.

10) InterNet Address

Real Name: John Doe
InterNet Address: j.doe@crapbbs.com
PossiblePW: j.doe@crapbbs.com, j.d@c.c, etc.

11) School Name

Real Name: John Doe
School: Faggot High School

PossiblePW: faggot, jdfaggot, jd@faggot, etc.

12) The name of someone they hate:

Real Name: John Doe
Person Hated: Des Meanie
PossiblePW: Des, Meanie, Desmeanie, etc.

13) A place where they live.

Real Name: John Doe
Borough of Home: Brooklyn
Possible PW: Brooklyn, jd@brook, etc.

14) Combinations of the above

In conclusion, although passwords are not even close to totally fool proof, they will
keep the script kiddie hackers out and deter other hackers from attempting to crack
your system. There are many ways other than brute forcing a password to
compromise a system. Still, passwords are the forefront of security and they should
be treated as such.

Reference(s):

For a listing of the ASCII table, visit this site www.delanet.com/~pparish/ascii.htm.

Selections included from:

Vortex[HIT], HIT Inc. Guide to password cracking.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH