SlideShare a Scribd company logo
1 of 32
Testing of
Password Policy
Anton Dedov

ZeroNights 2013
Who Am I
• Software Developer and Security Engineer
@ Parallels Automation
• Open source developer
• Mail: adedov@gmail.com
• Twitter: @brutemorse
Motivation
• It is hard for application developers to choose
between existing password meters reasonably.
• Worse, some implement their own [or
customize existing] without understanding of
security and psychological implications.
• Need some framework/criteria that would
help reasonable choice.

3
NAÏVE SECURITY MODEL
Untargeted Online Attacks
User base

Common
passwords
100 K

• 1 guess per user / day
• 2 days to find first password
• 100 days to find 50 passwords

10 K

100 K
2.5 K

5K

• 1 guess per user / day
• 10 days to find first password
• 1.5yr to find 50 passwords
Targeted Online Attacks
•
•
•
•
•

10 failed attempts  1 hour block
240 attempts per user / day
7200 attempts per user / month
86400 attempts per user / year
More IP-s scale linearly
Offline Attacks
• Huge dictionaries
• Specialized hardware and clusters
• No time/complexity limitations except
– Enforced password quality
– Hash speed
– Salt uniqueness

7
TESTING PASSWORD METERS
Candidates
•
•
•
•
•

Plesk
jquery.complexify
zxcvbn
libpwquality
passwdqc
Method
•
•
•
•

Apply meters to password bases
Dictionary attacks with JtR
Rule-based attacks with JtR
Collect essential parameters
Apply Meters
• Requirement: meter should provide
unambiguous signal about if password is
accepted or not.
• Passwdqc tells straight “OK” or “Bad”.
• Others return score. Minimal accepted score
documented.

11
Password Bases
•
•
•
•
•

Real customers
RockYou all
CMIYC-2010 not cracked
Random passphrases
Random 10-char passwords

Red for attacks; blue for psychological acceptance.
12
Dictionaries
Dictionary
Tiny English
RockYou top
Common-passwords
English
Tiny English crossed / 8 chars

Size, words
817
1438
3546
54316
72100

13
Rules
Rule
JtR defaults
JtR jumbo
m3g9tr0n-2048512
m3g9tr0n-2048517

Factor
~ 40
~ 5500
= 3510
~ 860

14
Cracking Sessions
None
JtR default

Tiny

817 words
41K words

JtR jumbo

4M words

m3g9tr0n2048512

2.8M words

m3g9tr0n2048517

707K words
15
Cracking Sessions
• 25 attacks per password base per meter
• Min dictionary size 817
• Max dictionary size 396M

RockYou dictionary was not used against RockYou password base.
16
Parameters
• M – passwords approved by meter
• D – attack dictionary size
• C – # of guessed passwords during attack
• Attack effectiveness

• Attack economy

C
M
C
D
17
Online Attacks Effectiveness

For dictionaries < 100K
Max guess rate 0.007%

18
Max Attack Effectiveness
0.1400%
0.1200%
0.1000%
0.0800%
0.0600%
0.0400%
0.0200%
0.0000%

passwdqc
customer2
customer1
rockyou

plesk

zxcvbn

complexify

pwquality

0.0304%
0.0210%
0.0011%

0.0130%
0.0089%
0.0002%

0.0182%
0.0315%
0.0130%

0.0546%
0.0460%
0.0049%

0.0794%
0.0290%
0.0224%
19
Max Attack Economy
160.0000%
140.0000%
120.0000%
100.0000%
80.0000%
60.0000%
40.0000%
20.0000%
0.0000%
rockyou
pwquality
complexify
zxcvbn
plesk
passwdqc

62.1545%
19.8816%
64.1850%
0.1224%
0.1224%

customer1
0.2782%
0.1224%
0.2782%
0.1224%
0.1224%

customer2
0.1224%
0.1224%
0.1224%
0.1224%
0.1224%

20
Average Attack Economy
9.0000%
8.0000%
7.0000%
6.0000%
5.0000%
4.0000%
3.0000%
2.0000%
1.0000%
0.0000%
rockyou
pwquality
complexify
zxcvbn
plesk
passwdqc

3.2154%
1.0375%
3.4033%
0.0079%
0.0137%

customer1
0.0177%
0.0095%
0.0180%
0.0092%
0.0092%

customer2
0.0093%
0.0101%
0.0096%
0.0092%
0.0094%

21
Guesses Totals
Meter
plesk
passwdqc
zxcvbn
complexify
libpwquality

RockYou

Customer 1

Customer 2

0.08%
0.18%
0.54%
0.54%
1.16%

0.28%
0.23%
0.26%
1.06%
0.50%

0.28%
0.12%
0.06%
0.40%
0.45%
Guesses Totals
2.50%

2.00%

1.50%

rockyou-all
customer2

1.00%

customer1
0.50%

0.00%

passwdqc

plesk

zxcvbn

complexify pwquality
23
Psy. Acceptance: User Passwords

Meter
plesk
passwdqc
zxcvbn
complexify
libpwquality

RockYou

Customer 1

Customer 2

0.21%
1.60%
5.43%
2.03%
4.32%

3.45%
14.90%
16.29%
7.05%
11.88%

5.53%
40.62%
43.16%
27.18%
34.27%
Psy. Acceptance: User Passwords
70.00%
60.00%
50.00%
40.00%

customer2
customer1

30.00%

rockyou-all
20.00%

10.00%
0.00%

passwdqc

plesk

zxcvbn complexify pwquality

25
Psy. Acceptance: Hard Passwords
Meter

plesk
passwdqc
zxcvbn
complexify
libpwquality

CMYIC-2010 Pass-Phrases

24%
59%
42%
3%
10%

0%
99.98%
99.76%
99.94%
99.82%

Random
10 chars
42%
100%
99.99%
0%
81%
26
Psy. Acceptance: Hard Passwords
100.00%
90.00%
80.00%
70.00%
60.00%

CMIYC2010-uncracked

50.00%

phrases-rand39

40.00%

random10

30.00%
20.00%
10.00%
0.00%
passwdqc

plesk

zxcvbn complexify pwquality
27
The “editors” choice
Security
passwdqc
plesk
zxcvbn
jquery.complexify
libpwquality

Psychology
zxcvbn
passwdqc
libpwquality
jquery.complexify
plesk

28
Conclusions
•
•
•
•

Test your security tools for security
Avoid write your own security tools
All tested meters protect from online attacks
Also seem protect from offline attacks
(for slow hashes and unique salts)

• But most tend to deny more passwords than it
is necessary, including known to be hard ones
• Passwdqc and zxcvbn look best
Where to go?
• Bigger dictionaries and brute force
• Testing on real people to
– Learn evolution of “common passwords” lists
– Test psychological acceptance empirically

• More meters?

30
Special thanks

Alexander Peslyak
Solar Designer

31
Bonus: time to process RockYou…
(MBP 2011)
3:15

zxcvbn
pwquality
plesk
passwdqc
complexify

5:48

0:13

0:26

0:16

0:00

1:12

2:24

3:36
Hours

4:48

6:00

7:12

More Related Content

Similar to Anton Dedov - Testing of password policy

Techniques for password hashing and cracking
Techniques for password hashing and crackingTechniques for password hashing and cracking
Techniques for password hashing and cracking
Nipun Joshi
 
TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)
Mike Felch
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
Robert Conti Jr.
 
Journey of Migrating Millions of Queries on The Cloud
Journey of Migrating Millions of Queries on The CloudJourney of Migrating Millions of Queries on The Cloud
Journey of Migrating Millions of Queries on The Cloud
takezoe
 

Similar to Anton Dedov - Testing of password policy (20)

Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Techniques for password hashing and cracking
Techniques for password hashing and crackingTechniques for password hashing and cracking
Techniques for password hashing and cracking
 
TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)TeelTech - Advancing Mobile Device Forensics (online version)
TeelTech - Advancing Mobile Device Forensics (online version)
 
Stress Test as a Culture
Stress Test as a CultureStress Test as a Culture
Stress Test as a Culture
 
Apex triggers i
Apex triggers iApex triggers i
Apex triggers i
 
Geek Sync I CSI for SQL: Learn to be a SQL Sleuth
Geek Sync I CSI for SQL: Learn to be a SQL SleuthGeek Sync I CSI for SQL: Learn to be a SQL Sleuth
Geek Sync I CSI for SQL: Learn to be a SQL Sleuth
 
Oracle database threats - LAOUC Webinar
Oracle database threats - LAOUC WebinarOracle database threats - LAOUC Webinar
Oracle database threats - LAOUC Webinar
 
Naked and Vulnerable - A Cybersecurity Starter Kit from Camp IT Dec 2016
Naked and Vulnerable - A Cybersecurity Starter Kit from Camp IT Dec 2016Naked and Vulnerable - A Cybersecurity Starter Kit from Camp IT Dec 2016
Naked and Vulnerable - A Cybersecurity Starter Kit from Camp IT Dec 2016
 
Everything You Need to Know About Sharding
Everything You Need to Know About ShardingEverything You Need to Know About Sharding
Everything You Need to Know About Sharding
 
Login cat tekmonks - v3
Login cat   tekmonks - v3Login cat   tekmonks - v3
Login cat tekmonks - v3
 
Add Redis to Postgres to Make Your Microservices Go Boom!
Add Redis to Postgres to Make Your Microservices Go Boom!Add Redis to Postgres to Make Your Microservices Go Boom!
Add Redis to Postgres to Make Your Microservices Go Boom!
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Docker/DevOps Meetup: Metrics-Driven Continuous Performance and Scalabilty
Docker/DevOps Meetup: Metrics-Driven Continuous Performance and ScalabiltyDocker/DevOps Meetup: Metrics-Driven Continuous Performance and Scalabilty
Docker/DevOps Meetup: Metrics-Driven Continuous Performance and Scalabilty
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
 
Journey of Migrating Millions of Queries on The Cloud
Journey of Migrating Millions of Queries on The CloudJourney of Migrating Millions of Queries on The Cloud
Journey of Migrating Millions of Queries on The Cloud
 
Why everyone speaks about DR but only few use it?
Why everyone speaks about DR but only few use it?Why everyone speaks about DR but only few use it?
Why everyone speaks about DR but only few use it?
 
Securing Solr Search Data in the Cloud
Securing Solr Search Data in the CloudSecuring Solr Search Data in the Cloud
Securing Solr Search Data in the Cloud
 
Securing Search Data in the Cloud
Securing Search Data in the CloudSecuring Search Data in the Cloud
Securing Search Data in the Cloud
 
Crafting tailored wordlists with Wordsmith
Crafting tailored wordlists with WordsmithCrafting tailored wordlists with Wordsmith
Crafting tailored wordlists with Wordsmith
 
The Amino Analytical Framework - Leveraging Accumulo to the Fullest
The Amino Analytical Framework - Leveraging Accumulo to the Fullest The Amino Analytical Framework - Leveraging Accumulo to the Fullest
The Amino Analytical Framework - Leveraging Accumulo to the Fullest
 

More from DefconRussia

[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC [DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
DefconRussia
 
Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23
DefconRussia
 

More from DefconRussia (20)

[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...
[Defcon Russia #29] Борис Савков -  Bare-metal programming на примере Raspber...[Defcon Russia #29] Борис Савков -  Bare-metal programming на примере Raspber...
[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...
 
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
 
[Defcon Russia #29] Алексей Тюрин - Spring autobinding
[Defcon Russia #29] Алексей Тюрин - Spring autobinding[Defcon Russia #29] Алексей Тюрин - Spring autobinding
[Defcon Russia #29] Алексей Тюрин - Spring autobinding
 
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
 
Георгий Зайцев - Reversing golang
Георгий Зайцев - Reversing golangГеоргий Зайцев - Reversing golang
Георгий Зайцев - Reversing golang
 
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC [DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
 
Cisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-oneCisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-one
 
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
 
HTTP HOST header attacks
HTTP HOST header attacksHTTP HOST header attacks
HTTP HOST header attacks
 
Attacks on tacacs - Алексей Тюрин
Attacks on tacacs - Алексей ТюринAttacks on tacacs - Алексей Тюрин
Attacks on tacacs - Алексей Тюрин
 
Weakpass - defcon russia 23
Weakpass - defcon russia 23Weakpass - defcon russia 23
Weakpass - defcon russia 23
 
nosymbols - defcon russia 20
nosymbols - defcon russia 20nosymbols - defcon russia 20
nosymbols - defcon russia 20
 
static - defcon russia 20
static  - defcon russia 20static  - defcon russia 20
static - defcon russia 20
 
Zn task - defcon russia 20
Zn task  - defcon russia 20Zn task  - defcon russia 20
Zn task - defcon russia 20
 
Vm ware fuzzing - defcon russia 20
Vm ware fuzzing  - defcon russia 20Vm ware fuzzing  - defcon russia 20
Vm ware fuzzing - defcon russia 20
 
Nedospasov defcon russia 23
Nedospasov defcon russia 23Nedospasov defcon russia 23
Nedospasov defcon russia 23
 
Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23
 
Miasm defcon russia 23
Miasm defcon russia 23Miasm defcon russia 23
Miasm defcon russia 23
 
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
 
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условияхSergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Anton Dedov - Testing of password policy

Editor's Notes

  1. Naïve model
  2. 0.007 2276 0.64185 rockyou-all zxcvbn common-passwords-none
  3. 0.1224% : 1 to 1000
  4. 0.01% : 1 to 10000.001% : 1 to 10000
  5. 1.72% of CMYIC was cracked
  6. 20K/s vs. 2000/s