2023 10 10 Passwords Personal Protection Karampelas
2023 10 10 Passwords Personal Protection Karampelas
2023 10 10 Passwords Personal Protection Karampelas
2020-1-EL01-KA203-079068
Cyber Warfare
Defensive Cyberspace Operations
Panagiotis Karampelas
Hellenic Air Force Academy
02 November 2022
Contents
01 Personal Defence
01 Personal Defence
Let’s talk about passwords
How many
passwords do
you have?
Let’s talk about passwords
How do you
remember all
your
passwords?
Let’s talk about passwords
HAFA_lms*123
MD2
Hash
Function
be4daea02481783dfa672580c0ac0627
HAFA_lms*124 17e35d0ad3f405223bea4fbb9c31b97d
What happens when we create a
password?
• There are many different hashing algorithms
▪ md2, md4, md5
▪ sha1, sha224, sha256, sha384, sha512
▪ ripemd128, ripemd160, ripemd256, ripemd320
▪…
• Hashes cannot be decrypted
HAFA_lms*123
MD5
Hash
Function
c49ecabfa583f84c2c9b43dc490d000a
HAFA_lms*124 b855c8420964af368e811731f0bf030c
How do we login into a system
then?
• We enter the same password as before
• It goes through the same hashing algorithm as
before
• It simply compares the new hash value with what
was stored when you created your account
HAFA_lms*123
MD5
Hash
Function
c49ecabfa583f84c2c9b43dc490d000a
HAFA_lms*124 b855c8420964af368e811731f0bf030c
If that is the case then how?
Lecture 05
How was my password cracked?
Lecture 05
Tools to use to find if my password
has been compromised
• I can check whether my password has leaked
• I can see in which list my password is
▪ https://haveibeenpwned.com
Xylogiannopoulos, Konstantinos F., Panagiotis Karampelas, and Reda Alhajj. "A password creation and validation system for
social media platforms based on big data analytics." Journal of Ambient Intelligence and Humanized Computing (2019): 1-21.
Password length
Percentage of passwords per length
Xylogiannopoulos, Konstantinos F., Panagiotis Karampelas, and Reda Alhajj. "A password creation and validation system for
social media platforms based on big data analytics." Journal of Ambient Intelligence and Humanized Computing (2019): 1-21.
Most frequent password
Most frequent patterns in passwords with length 10
Xylogiannopoulos, Konstantinos F., Panagiotis Karampelas, and Reda Alhajj. "A password creation and validation system for
social media platforms based on big data analytics." Journal of Ambient Intelligence and Humanized Computing (2019): 1-21.
Most frequent password
Most frequent number patterns in passwords with length 5
Xylogiannopoulos, Konstantinos F., Panagiotis Karampelas, and Reda Alhajj. "A password creation and validation system for
social media platforms based on big data analytics." Journal of Ambient Intelligence and Humanized Computing (2019): 1-21.
Most frequent password
Most frequent keyboard patterns and numbers in passwords
Xylogiannopoulos, Konstantinos F., Panagiotis Karampelas, and Reda Alhajj. "A password creation and validation system for
social media platforms based on big data analytics." Journal of Ambient Intelligence and Humanized Computing (2019): 1-21.
How these passwords were
cracked?
• Brute Force attack
▪ Try all combinations, e.g. aaa, aab, aac, …
▪ Often aided with a Rainbow Table -> pre-computed hash
values for all possible combinations of an “alphabet”
• L0phtCrack
• John the Ripper
• Ophcrack
• Burp Suite
• CeWL
• Hashcat
• THC-Hydra
Lecture 05
MD5 hashed password
https://www.hivesystems.io/password-table
Questions?
The European Commission support for the production of this publication does not
constitute an endorsement of the contents which reflects the views only of the
authors, and the Commission cannot be held responsible for any use which may be
made of the information contained therein.