1_2_9 Section 1 – Attacks, Threats, and Vulnerabilities - 1.2 – Attack Types - Password Attacks
68 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main reason an attacker loves applications that store passwords as plain text?

  • High level of security
  • Complex encryption techniques
  • Easy access to usernames and passwords (correct)
  • Difficult to retrieve data
  • Why is storing passwords as plain text considered a security risk?

  • Hashing passwords is a complex process
  • Storing passwords as plain text is more secure than hashing
  • Plain text passwords cannot be accessed by anyone
  • Passwords can be easily read if the database is accessed by an attacker (correct)
  • What is the recommended method for storing passwords securely?

  • Disabling password storage completely
  • Storing passwords in plain text
  • Using hashes (correct)
  • Encrypting passwords with a reversible algorithm
  • What is unique about the hash of a password?

    <p>It is very specific to a particular password and cannot be duplicated on a system</p> Signup and view all the answers

    Why is hashing considered a secure method for storing passwords?

    <p>It provides a one-way trip representation of the password</p> Signup and view all the answers

    What should you do if you encounter an application storing passwords as plain text?

    <p>Stop using the application or find an upgrade that doesn't store plain text passwords</p> Signup and view all the answers

    What is the primary characteristic of a cryptographic algorithm mentioned in the text?

    <p>It cannot be reversed</p> Signup and view all the answers

    What hashing algorithm was specifically discussed in the text?

    <p>SHA-256</p> Signup and view all the answers

    How does a spraying attack differ from brute force attacks?

    <p>Spraying attacks try only a few common passwords</p> Signup and view all the answers

    In the context of password attacks, what does 'querty' represent?

    <p>A common password</p> Signup and view all the answers

    What is the purpose of using 'common passwords' in password attacks?

    <p>To avoid detection by alarms</p> Signup and view all the answers

    What is one reason an attacker might choose a spraying attack over a brute force attack?

    <p>Less chance of being locked out of an account</p> Signup and view all the answers

    Why are the hashes of common passwords provided in the text?

    <p>To demonstrate how hashing algorithms work</p> Signup and view all the answers

    'Brute force attacks' aim to find passwords by trying:

    <p>Random letters and numbers</p> Signup and view all the answers

    'Spraying attacks' try to avoid alarms by:

    <p>'Trying' only a few common passwords per account</p> Signup and view all the answers

    What do attackers aim to obtain in a brute force attack?

    <p>Passwords of all accounts on a system</p> Signup and view all the answers

    What is the purpose of adding a salt to passwords?

    <p>To ensure different hashes for identical passwords</p> Signup and view all the answers

    How does the addition of salt affect the hash of identical passwords?

    <p>It makes the hash completely random</p> Signup and view all the answers

    What is the main challenge associated with rainbow tables?

    <p>Different applications may use different hashing methods</p> Signup and view all the answers

    Why was 'collection number one' significant in January 2019?

    <p>It had one billion unique passwords</p> Signup and view all the answers

    What impact does salting passwords have on pre-built tables like rainbow tables?

    <p>It renders the tables ineffective</p> Signup and view all the answers

    How do salts contribute to the security of stored passwords?

    <p>By obscuring identical passwords</p> Signup and view all the answers

    Why is it essential for each user to have a unique salt added to their password?

    <p>To differentiate identical passwords</p> Signup and view all the answers

    What is the purpose of having a password manager that generates different passwords for each account?

    <p>To complicate rainbow table lookups</p> Signup and view all the answers

    What kind of data is a 'salt' when used in password hashing?

    <p>A piece of unrelated, random data added to the password before hashing.</p> Signup and view all the answers

    What does 'haveibeenpwned.com' allow users to check for?

    <p>If their email addresses are part of any data breaches.</p> Signup and view all the answers

    What type of attack involves programmatically stepping through every possible combination of a password offline?

    <p>Brute force attack</p> Signup and view all the answers

    In a dictionary attack, attackers use common words from dictionaries to guess passwords. What is another feature of these attacks?

    <p>They perform letter substitutions</p> Signup and view all the answers

    What is the purpose of rainbow tables in password cracking?

    <p>To store precomputed hashes for quick password lookup</p> Signup and view all the answers

    Why do attackers often use distributed cracking formats?

    <p>To speed up the password cracking process</p> Signup and view all the answers

    What would be the outcome if an account is locked out after a few failed login attempts?

    <p>The account is disabled for brute force attacks</p> Signup and view all the answers

    What type of characters are typically included in a brute force attack on passwords?

    <p>Letters, numbers, and special characters</p> Signup and view all the answers

    What technique is used in some password cracking programs to try variations like changing 'A' to '&' and 'O' to '0'?

    <p>'Substitution' for letters</p> Signup and view all the answers

    Which type of attack involves using high-speed CPUs found in GPUs to quickly crack passwords?

    <p>Hash attack</p> Signup and view all the answers

    What is the function of hashing passwords in the context of password cracking?

    <p>'Comparing' stored hashes for verification</p> Signup and view all the answers

    What type of attack often locks accounts out after multiple failed login attempts?

    <p>Brute Force Attack</p> Signup and view all the answers

    Why is storing passwords as plain text considered a security risk?

    <p>Plain text passwords can be easily read by attackers if they gain access to the database.</p> Signup and view all the answers

    What is the main advantage of hashing passwords instead of storing them as plain text?

    <p>Hashes provide a unique representation of the password that is not reversible.</p> Signup and view all the answers

    Why are hashes considered a more secure method for storing passwords than encryption?

    <p>Hashes are one-way functions, making it difficult to retrieve the original password from the hash.</p> Signup and view all the answers

    What is the primary risk associated with applications that store passwords in plain text?

    <p>The possibility of attackers gaining access to all user credentials easily.</p> Signup and view all the answers

    How does hashing of passwords contribute to data security?

    <p>Hashing produces a unique representation of each password that prevents reverse engineering.</p> Signup and view all the answers

    What is the significance of using a hash to store passwords?

    <p>Hashing provides a secure way to store passwords without revealing the original plain text passwords.</p> Signup and view all the answers

    What type of attack involves going through every possible combination of letters, numbers, and special characters offline?

    <p>Brute force attack</p> Signup and view all the answers

    In password cracking, what method allows attackers to quickly search for previously computed hashes?

    <p>Rainbow tables</p> Signup and view all the answers

    What type of attack uses commonly found words, including those from specific dictionaries?

    <p>Dictionary attack</p> Signup and view all the answers

    Which method allows attackers to quickly identify common passwords like 'ninja' and 'dragon'?

    <p>Performing a dictionary attack</p> Signup and view all the answers

    What technique involves changing characters like 'A' to '&' and 'O' to '0' during password cracking attempts?

    <p>Letter substitution</p> Signup and view all the answers

    How do attackers speed up the process of offline password cracking by utilizing external hardware?

    <p>Employing GPU processing power</p> Signup and view all the answers

    Why is it more efficient for attackers to use a subset of words from a dictionary during password cracking?

    <p>It reduces the number of hash comparisons needed</p> Signup and view all the answers

    What impact does salting passwords have on pre-built tables like rainbow tables?

    <p>It prevents the pre-built tables from working effectively.</p> Signup and view all the answers

    Why is having a unique salt added to each password considered important for security?

    <p>To prevent attackers from using rainbow tables effectively.</p> Signup and view all the answers

    Why is it impossible to restore a hashed password back to its original format?

    <p>Hashing is a one-way process designed not to be reversible</p> Signup and view all the answers

    What characteristic of hashing makes it a secure method for storing passwords?

    <p>Hashes are one-way functions.</p> Signup and view all the answers

    What is the primary purpose of a spraying attack compared to a brute force attack?

    <p>To avoid triggering alarms from repeated failed login attempts</p> Signup and view all the answers

    What purpose do rainbow tables serve in password cracking?

    <p>To quickly find matching hashes for common passwords.</p> Signup and view all the answers

    What makes a brute force attack time-consuming when trying to crack passwords?

    <p>Having to try every possible combination of characters</p> Signup and view all the answers

    In password cracking, what is the purpose of using 'common passwords' like '1, 2, 3, 4, 5, 6'?

    <p>To increase the chances of guessing correctly</p> Signup and view all the answers

    What extra security measure do programmers use to store passwords besides hashing?

    <p>Adding a random salt to each password before hashing.</p> Signup and view all the answers

    What differentiates salts from plain text passwords stored in a database?

    <p>Salts are added before hashing to increase security.</p> Signup and view all the answers

    What role does the hashing algorithm play in password security?

    <p>It makes it impossible to determine the original password from its hash</p> Signup and view all the answers

    What distinguishes a spraying attack from a brute force attack in terms of strategy?

    <p>Spraying attacks aim to evade detection by trying only a few common passwords</p> Signup and view all the answers

    Why does using 'haveibeenpwned.com' help users determine if their accounts are at risk?

    <p>It checks if the user's emails and passwords were part of data breaches.</p> Signup and view all the answers

    How does including a salt with passwords make rainbow tables less effective?

    <p>It adds randomness, making each password unique even if the password is common.</p> Signup and view all the answers

    How does adding a salt to passwords enhance security?

    <p>It prevents attackers from using pre-built tables like rainbow tables</p> Signup and view all the answers

    Why is 'collection number one' significant in the context of data breaches?

    <p>'collection number one' included over 1.1 billion unique emails and passwords, impacting millions of users.</p> Signup and view all the answers

    '1, 2, 3, 4, 5, 6' and 'querty' were mentioned in the text as examples of what?

    <p>'Weak and easily guessable passwords'</p> Signup and view all the answers

    What makes rainbow tables ineffective when attacking salted passwords?

    <p>The unique salt values prevent precomputed hash lookups.</p> Signup and view all the answers

    What is a notable characteristic of a cryptographic algorithm?

    <p>Creates distinct hashes for unique inputs.</p> Signup and view all the answers

    More Like This

    Password Hashing and Secure Storage Quiz
    3 questions
    Secure Passwords in Education
    10 questions
    Creating Strong and Secure Passwords
    12 questions
    Password Security Best Practices
    35 questions
    Use Quizgecko on...
    Browser
    Browser