Blog Posts Tagged with "Dictionary Attack"

54a9b7b662bfb0f0445d1661d7ed180b

Password Protection Pointers

June 12, 2012 Added by:Jayson Wylie

The best password is the one that only you know. Even better one is one that nobody else can find out. Crackers are getting away from massive rainbow tables and moving on to graphics processors for quick password compromise. It is possible to categorize your passwords to define the sensitivity of their purpose....

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

LinkedIn: Vulnerability in the Authentication Process

May 22, 2012 Added by:Pierluigi Paganini

This attack is possible due to an error in validating of the security token (CSRF token) that allows an unlimited number of requests using the same token for different users. The only mechanism against the attack is a CAPTCHA challenge-response test after dozens of attempts...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Verizon Breach Report – Application Security Specific Highlights

March 28, 2012 Added by:Fergal Glynn

Eight-one percent of attacks utilized hacking. There was a stark difference between large and small organizations. SQL injection comes in 3rd after use of stolen logins and exploitation of backdoor or command and control channel. It is tied with dictionary attacks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Password Cracking Methods

December 05, 2011 Added by:Headlines

"A rainbow table is a list of pre-computed hashes - the numerical value of an encrypted password, used by most systems today - and that’s the hashes of all possible password combinations for any given hashing algorithm mind..."

Comments  (2)

09e5dbdf8a3bd6dccce5621459b11e26

Hacking the WPA Airwaves

May 16, 2011 Added by:Mark Bennett

Many people believe that their wireless is secure because they are using WPA. Well we did a test recently and were able to basically password guess our way with a dictionary attack using either a straight dictionary or a rainbow table. Using linux this is how it is done...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Check Your Password Security

March 29, 2011 Added by:Robert Siciliano

Passwords are the bane of the security community. We are forced to rely on them, while knowing they’re only as secure as our operating systems, which can be compromised by spyware and malware. There are a number of common techniques used to crack passwords...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Twitter Settles with FTC Over Data Privacy and Security

March 14, 2011 Added by:Headlines

“Twitter has engaged in a number of practices that, taken together, failed to provide reasonable and appropriate security to: prevent unauthorized access to nonpublic user information and honor the privacy choices exercised by its users in designating certain tweets as nonpublic..."

Comments  (0)

959779642e6e758563e80b5d83150a9f

Securing Web Services in the Cloud

January 19, 2011 Added by:Danny Lieberman

Access to confidential information or embezzlement of funds is just some of the possible internal security breaches that can be performed by employees or former employees. Because employees are the most familiar with internal systems, detection can be made extremely difficult...

Comments  (3)