1_2_9 Section 1 – Attacks, Threats, and Vulnerabilities - 1.2 – Attack Types - Password Attacks
68 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main reason an attacker loves applications that store passwords as plain text?

  • High level of security
  • Complex encryption techniques
  • Easy access to usernames and passwords (correct)
  • Difficult to retrieve data

Why is storing passwords as plain text considered a security risk?

  • Hashing passwords is a complex process
  • Storing passwords as plain text is more secure than hashing
  • Plain text passwords cannot be accessed by anyone
  • Passwords can be easily read if the database is accessed by an attacker (correct)

What is the recommended method for storing passwords securely?

  • Disabling password storage completely
  • Storing passwords in plain text
  • Using hashes (correct)
  • Encrypting passwords with a reversible algorithm

What is unique about the hash of a password?

<p>It is very specific to a particular password and cannot be duplicated on a system (A)</p> Signup and view all the answers

Why is hashing considered a secure method for storing passwords?

<p>It provides a one-way trip representation of the password (A)</p> Signup and view all the answers

What should you do if you encounter an application storing passwords as plain text?

<p>Stop using the application or find an upgrade that doesn't store plain text passwords (C)</p> Signup and view all the answers

What is the primary characteristic of a cryptographic algorithm mentioned in the text?

<p>It cannot be reversed (D)</p> Signup and view all the answers

What hashing algorithm was specifically discussed in the text?

<p>SHA-256 (D)</p> Signup and view all the answers

How does a spraying attack differ from brute force attacks?

<p>Spraying attacks try only a few common passwords (A)</p> Signup and view all the answers

In the context of password attacks, what does 'querty' represent?

<p>A common password (C)</p> Signup and view all the answers

What is the purpose of using 'common passwords' in password attacks?

<p>To avoid detection by alarms (B)</p> Signup and view all the answers

What is one reason an attacker might choose a spraying attack over a brute force attack?

<p>Less chance of being locked out of an account (D)</p> Signup and view all the answers

Why are the hashes of common passwords provided in the text?

<p>To demonstrate how hashing algorithms work (C)</p> Signup and view all the answers

'Brute force attacks' aim to find passwords by trying:

<p>Random letters and numbers (C)</p> Signup and view all the answers

'Spraying attacks' try to avoid alarms by:

<p>'Trying' only a few common passwords per account (C)</p> Signup and view all the answers

What do attackers aim to obtain in a brute force attack?

<p>Passwords of all accounts on a system (A)</p> Signup and view all the answers

What is the purpose of adding a salt to passwords?

<p>To ensure different hashes for identical passwords (C)</p> Signup and view all the answers

How does the addition of salt affect the hash of identical passwords?

<p>It makes the hash completely random (A)</p> Signup and view all the answers

What is the main challenge associated with rainbow tables?

<p>Different applications may use different hashing methods (A)</p> Signup and view all the answers

Why was 'collection number one' significant in January 2019?

<p>It had one billion unique passwords (B)</p> Signup and view all the answers

What impact does salting passwords have on pre-built tables like rainbow tables?

<p>It renders the tables ineffective (A)</p> Signup and view all the answers

How do salts contribute to the security of stored passwords?

<p>By obscuring identical passwords (D)</p> Signup and view all the answers

Why is it essential for each user to have a unique salt added to their password?

<p>To differentiate identical passwords (B)</p> Signup and view all the answers

What is the purpose of having a password manager that generates different passwords for each account?

<p>To complicate rainbow table lookups (D)</p> Signup and view all the answers

What kind of data is a 'salt' when used in password hashing?

<p>A piece of unrelated, random data added to the password before hashing. (C)</p> Signup and view all the answers

What does 'haveibeenpwned.com' allow users to check for?

<p>If their email addresses are part of any data breaches. (B)</p> Signup and view all the answers

What type of attack involves programmatically stepping through every possible combination of a password offline?

<p>Brute force attack (B)</p> Signup and view all the answers

In a dictionary attack, attackers use common words from dictionaries to guess passwords. What is another feature of these attacks?

<p>They perform letter substitutions (D)</p> Signup and view all the answers

What is the purpose of rainbow tables in password cracking?

<p>To store precomputed hashes for quick password lookup (B)</p> Signup and view all the answers

Why do attackers often use distributed cracking formats?

<p>To speed up the password cracking process (B)</p> Signup and view all the answers

What would be the outcome if an account is locked out after a few failed login attempts?

<p>The account is disabled for brute force attacks (D)</p> Signup and view all the answers

What type of characters are typically included in a brute force attack on passwords?

<p>Letters, numbers, and special characters (D)</p> Signup and view all the answers

What technique is used in some password cracking programs to try variations like changing 'A' to '&' and 'O' to '0'?

<p>'Substitution' for letters (A)</p> Signup and view all the answers

Which type of attack involves using high-speed CPUs found in GPUs to quickly crack passwords?

<p>Hash attack (A)</p> Signup and view all the answers

What is the function of hashing passwords in the context of password cracking?

<p>'Comparing' stored hashes for verification (D)</p> Signup and view all the answers

What type of attack often locks accounts out after multiple failed login attempts?

<p>Brute Force Attack (C)</p> Signup and view all the answers

Why is storing passwords as plain text considered a security risk?

<p>Plain text passwords can be easily read by attackers if they gain access to the database. (A)</p> Signup and view all the answers

What is the main advantage of hashing passwords instead of storing them as plain text?

<p>Hashes provide a unique representation of the password that is not reversible. (A)</p> Signup and view all the answers

Why are hashes considered a more secure method for storing passwords than encryption?

<p>Hashes are one-way functions, making it difficult to retrieve the original password from the hash. (B)</p> Signup and view all the answers

What is the primary risk associated with applications that store passwords in plain text?

<p>The possibility of attackers gaining access to all user credentials easily. (D)</p> Signup and view all the answers

How does hashing of passwords contribute to data security?

<p>Hashing produces a unique representation of each password that prevents reverse engineering. (B)</p> Signup and view all the answers

What is the significance of using a hash to store passwords?

<p>Hashing provides a secure way to store passwords without revealing the original plain text passwords. (A)</p> Signup and view all the answers

What type of attack involves going through every possible combination of letters, numbers, and special characters offline?

<p>Brute force attack (A)</p> Signup and view all the answers

In password cracking, what method allows attackers to quickly search for previously computed hashes?

<p>Rainbow tables (D)</p> Signup and view all the answers

What type of attack uses commonly found words, including those from specific dictionaries?

<p>Dictionary attack (C)</p> Signup and view all the answers

Which method allows attackers to quickly identify common passwords like 'ninja' and 'dragon'?

<p>Performing a dictionary attack (B)</p> Signup and view all the answers

What technique involves changing characters like 'A' to '&' and 'O' to '0' during password cracking attempts?

<p>Letter substitution (D)</p> Signup and view all the answers

How do attackers speed up the process of offline password cracking by utilizing external hardware?

<p>Employing GPU processing power (B)</p> Signup and view all the answers

Why is it more efficient for attackers to use a subset of words from a dictionary during password cracking?

<p>It reduces the number of hash comparisons needed (B)</p> Signup and view all the answers

What impact does salting passwords have on pre-built tables like rainbow tables?

<p>It prevents the pre-built tables from working effectively. (D)</p> Signup and view all the answers

Why is having a unique salt added to each password considered important for security?

<p>To prevent attackers from using rainbow tables effectively. (C)</p> Signup and view all the answers

Why is it impossible to restore a hashed password back to its original format?

<p>Hashing is a one-way process designed not to be reversible (A)</p> Signup and view all the answers

What characteristic of hashing makes it a secure method for storing passwords?

<p>Hashes are one-way functions. (D)</p> Signup and view all the answers

What is the primary purpose of a spraying attack compared to a brute force attack?

<p>To avoid triggering alarms from repeated failed login attempts (D)</p> Signup and view all the answers

What purpose do rainbow tables serve in password cracking?

<p>To quickly find matching hashes for common passwords. (D)</p> Signup and view all the answers

What makes a brute force attack time-consuming when trying to crack passwords?

<p>Having to try every possible combination of characters (C)</p> Signup and view all the answers

In password cracking, what is the purpose of using 'common passwords' like '1, 2, 3, 4, 5, 6'?

<p>To increase the chances of guessing correctly (D)</p> Signup and view all the answers

What extra security measure do programmers use to store passwords besides hashing?

<p>Adding a random salt to each password before hashing. (B)</p> Signup and view all the answers

What differentiates salts from plain text passwords stored in a database?

<p>Salts are added before hashing to increase security. (C)</p> Signup and view all the answers

What role does the hashing algorithm play in password security?

<p>It makes it impossible to determine the original password from its hash (B)</p> Signup and view all the answers

What distinguishes a spraying attack from a brute force attack in terms of strategy?

<p>Spraying attacks aim to evade detection by trying only a few common passwords (C)</p> Signup and view all the answers

Why does using 'haveibeenpwned.com' help users determine if their accounts are at risk?

<p>It checks if the user's emails and passwords were part of data breaches. (A)</p> Signup and view all the answers

How does including a salt with passwords make rainbow tables less effective?

<p>It adds randomness, making each password unique even if the password is common. (D)</p> Signup and view all the answers

How does adding a salt to passwords enhance security?

<p>It prevents attackers from using pre-built tables like rainbow tables (A)</p> Signup and view all the answers

Why is 'collection number one' significant in the context of data breaches?

<p>'collection number one' included over 1.1 billion unique emails and passwords, impacting millions of users. (D)</p> Signup and view all the answers

'1, 2, 3, 4, 5, 6' and 'querty' were mentioned in the text as examples of what?

<p>'Weak and easily guessable passwords' (B)</p> Signup and view all the answers

What makes rainbow tables ineffective when attacking salted passwords?

<p>The unique salt values prevent precomputed hash lookups. (B)</p> Signup and view all the answers

What is a notable characteristic of a cryptographic algorithm?

<p>Creates distinct hashes for unique inputs. (D)</p> Signup and view all the answers

More Like This

Password Hashing and Secure Storage Quiz
3 questions
Secure Passwords in Education
10 questions
Creating Strong and Secure Passwords
12 questions
Password Security Best Practices
18 questions
Use Quizgecko on...
Browser
Browser