1_2_9 Section 1 – Attacks, Threats, and Vulnerabilities - 1.2 – Attack Types - Password Attacks

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main reason an attacker loves applications that store passwords as plain text?

  • High level of security
  • Complex encryption techniques
  • Easy access to usernames and passwords (correct)
  • Difficult to retrieve data

Why is storing passwords as plain text considered a security risk?

  • Hashing passwords is a complex process
  • Storing passwords as plain text is more secure than hashing
  • Plain text passwords cannot be accessed by anyone
  • Passwords can be easily read if the database is accessed by an attacker (correct)

What is the recommended method for storing passwords securely?

  • Disabling password storage completely
  • Storing passwords in plain text
  • Using hashes (correct)
  • Encrypting passwords with a reversible algorithm

What is unique about the hash of a password?

<p>It is very specific to a particular password and cannot be duplicated on a system (A)</p> Signup and view all the answers

Why is hashing considered a secure method for storing passwords?

<p>It provides a one-way trip representation of the password (A)</p> Signup and view all the answers

What should you do if you encounter an application storing passwords as plain text?

<p>Stop using the application or find an upgrade that doesn't store plain text passwords (C)</p> Signup and view all the answers

What is the primary characteristic of a cryptographic algorithm mentioned in the text?

<p>It cannot be reversed (D)</p> Signup and view all the answers

What hashing algorithm was specifically discussed in the text?

<p>SHA-256 (D)</p> Signup and view all the answers

How does a spraying attack differ from brute force attacks?

<p>Spraying attacks try only a few common passwords (A)</p> Signup and view all the answers

In the context of password attacks, what does 'querty' represent?

<p>A common password (C)</p> Signup and view all the answers

What is the purpose of using 'common passwords' in password attacks?

<p>To avoid detection by alarms (B)</p> Signup and view all the answers

What is one reason an attacker might choose a spraying attack over a brute force attack?

<p>Less chance of being locked out of an account (D)</p> Signup and view all the answers

Why are the hashes of common passwords provided in the text?

<p>To demonstrate how hashing algorithms work (C)</p> Signup and view all the answers

'Brute force attacks' aim to find passwords by trying:

<p>Random letters and numbers (C)</p> Signup and view all the answers

'Spraying attacks' try to avoid alarms by:

<p>'Trying' only a few common passwords per account (C)</p> Signup and view all the answers

What do attackers aim to obtain in a brute force attack?

<p>Passwords of all accounts on a system (A)</p> Signup and view all the answers

What is the purpose of adding a salt to passwords?

<p>To ensure different hashes for identical passwords (C)</p> Signup and view all the answers

How does the addition of salt affect the hash of identical passwords?

<p>It makes the hash completely random (A)</p> Signup and view all the answers

What is the main challenge associated with rainbow tables?

<p>Different applications may use different hashing methods (A)</p> Signup and view all the answers

Why was 'collection number one' significant in January 2019?

<p>It had one billion unique passwords (B)</p> Signup and view all the answers

What impact does salting passwords have on pre-built tables like rainbow tables?

<p>It renders the tables ineffective (A)</p> Signup and view all the answers

How do salts contribute to the security of stored passwords?

<p>By obscuring identical passwords (D)</p> Signup and view all the answers

Why is it essential for each user to have a unique salt added to their password?

<p>To differentiate identical passwords (B)</p> Signup and view all the answers

What is the purpose of having a password manager that generates different passwords for each account?

<p>To complicate rainbow table lookups (D)</p> Signup and view all the answers

What kind of data is a 'salt' when used in password hashing?

<p>A piece of unrelated, random data added to the password before hashing. (C)</p> Signup and view all the answers

What does 'haveibeenpwned.com' allow users to check for?

<p>If their email addresses are part of any data breaches. (B)</p> Signup and view all the answers

What type of attack involves programmatically stepping through every possible combination of a password offline?

<p>Brute force attack (B)</p> Signup and view all the answers

In a dictionary attack, attackers use common words from dictionaries to guess passwords. What is another feature of these attacks?

<p>They perform letter substitutions (D)</p> Signup and view all the answers

What is the purpose of rainbow tables in password cracking?

<p>To store precomputed hashes for quick password lookup (B)</p> Signup and view all the answers

Why do attackers often use distributed cracking formats?

<p>To speed up the password cracking process (B)</p> Signup and view all the answers

What would be the outcome if an account is locked out after a few failed login attempts?

<p>The account is disabled for brute force attacks (D)</p> Signup and view all the answers

What type of characters are typically included in a brute force attack on passwords?

<p>Letters, numbers, and special characters (D)</p> Signup and view all the answers

What technique is used in some password cracking programs to try variations like changing 'A' to '&' and 'O' to '0'?

<p>'Substitution' for letters (A)</p> Signup and view all the answers

Which type of attack involves using high-speed CPUs found in GPUs to quickly crack passwords?

<p>Hash attack (A)</p> Signup and view all the answers

What is the function of hashing passwords in the context of password cracking?

<p>'Comparing' stored hashes for verification (D)</p> Signup and view all the answers

What type of attack often locks accounts out after multiple failed login attempts?

<p>Brute Force Attack (C)</p> Signup and view all the answers

Why is storing passwords as plain text considered a security risk?

<p>Plain text passwords can be easily read by attackers if they gain access to the database. (A)</p> Signup and view all the answers

What is the main advantage of hashing passwords instead of storing them as plain text?

<p>Hashes provide a unique representation of the password that is not reversible. (A)</p> Signup and view all the answers

Why are hashes considered a more secure method for storing passwords than encryption?

<p>Hashes are one-way functions, making it difficult to retrieve the original password from the hash. (B)</p> Signup and view all the answers

What is the primary risk associated with applications that store passwords in plain text?

<p>The possibility of attackers gaining access to all user credentials easily. (D)</p> Signup and view all the answers

How does hashing of passwords contribute to data security?

<p>Hashing produces a unique representation of each password that prevents reverse engineering. (B)</p> Signup and view all the answers

What is the significance of using a hash to store passwords?

<p>Hashing provides a secure way to store passwords without revealing the original plain text passwords. (A)</p> Signup and view all the answers

What type of attack involves going through every possible combination of letters, numbers, and special characters offline?

<p>Brute force attack (A)</p> Signup and view all the answers

In password cracking, what method allows attackers to quickly search for previously computed hashes?

<p>Rainbow tables (D)</p> Signup and view all the answers

What type of attack uses commonly found words, including those from specific dictionaries?

<p>Dictionary attack (C)</p> Signup and view all the answers

Which method allows attackers to quickly identify common passwords like 'ninja' and 'dragon'?

<p>Performing a dictionary attack (B)</p> Signup and view all the answers

What technique involves changing characters like 'A' to '&' and 'O' to '0' during password cracking attempts?

<p>Letter substitution (D)</p> Signup and view all the answers

How do attackers speed up the process of offline password cracking by utilizing external hardware?

<p>Employing GPU processing power (B)</p> Signup and view all the answers

Why is it more efficient for attackers to use a subset of words from a dictionary during password cracking?

<p>It reduces the number of hash comparisons needed (B)</p> Signup and view all the answers

What impact does salting passwords have on pre-built tables like rainbow tables?

<p>It prevents the pre-built tables from working effectively. (D)</p> Signup and view all the answers

Why is having a unique salt added to each password considered important for security?

<p>To prevent attackers from using rainbow tables effectively. (C)</p> Signup and view all the answers

Why is it impossible to restore a hashed password back to its original format?

<p>Hashing is a one-way process designed not to be reversible (A)</p> Signup and view all the answers

What characteristic of hashing makes it a secure method for storing passwords?

<p>Hashes are one-way functions. (D)</p> Signup and view all the answers

What is the primary purpose of a spraying attack compared to a brute force attack?

<p>To avoid triggering alarms from repeated failed login attempts (D)</p> Signup and view all the answers

What purpose do rainbow tables serve in password cracking?

<p>To quickly find matching hashes for common passwords. (D)</p> Signup and view all the answers

What makes a brute force attack time-consuming when trying to crack passwords?

<p>Having to try every possible combination of characters (C)</p> Signup and view all the answers

In password cracking, what is the purpose of using 'common passwords' like '1, 2, 3, 4, 5, 6'?

<p>To increase the chances of guessing correctly (D)</p> Signup and view all the answers

What extra security measure do programmers use to store passwords besides hashing?

<p>Adding a random salt to each password before hashing. (B)</p> Signup and view all the answers

What differentiates salts from plain text passwords stored in a database?

<p>Salts are added before hashing to increase security. (C)</p> Signup and view all the answers

What role does the hashing algorithm play in password security?

<p>It makes it impossible to determine the original password from its hash (B)</p> Signup and view all the answers

What distinguishes a spraying attack from a brute force attack in terms of strategy?

<p>Spraying attacks aim to evade detection by trying only a few common passwords (C)</p> Signup and view all the answers

Why does using 'haveibeenpwned.com' help users determine if their accounts are at risk?

<p>It checks if the user's emails and passwords were part of data breaches. (A)</p> Signup and view all the answers

How does including a salt with passwords make rainbow tables less effective?

<p>It adds randomness, making each password unique even if the password is common. (D)</p> Signup and view all the answers

How does adding a salt to passwords enhance security?

<p>It prevents attackers from using pre-built tables like rainbow tables (A)</p> Signup and view all the answers

Why is 'collection number one' significant in the context of data breaches?

<p>'collection number one' included over 1.1 billion unique emails and passwords, impacting millions of users. (D)</p> Signup and view all the answers

'1, 2, 3, 4, 5, 6' and 'querty' were mentioned in the text as examples of what?

<p>'Weak and easily guessable passwords' (B)</p> Signup and view all the answers

What makes rainbow tables ineffective when attacking salted passwords?

<p>The unique salt values prevent precomputed hash lookups. (B)</p> Signup and view all the answers

What is a notable characteristic of a cryptographic algorithm?

<p>Creates distinct hashes for unique inputs. (D)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Secure Passwords in Education
10 questions
Creating Strong and Secure Passwords
12 questions
Password Security Best Practices
35 questions
Password Security Best Practices
18 questions
Use Quizgecko on...
Browser
Browser