Asus Tech Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 19 October 2012

Bad passwords are worse than you think

Posted on 02:00 by Unknown
Bad passwords are worse than you think:
from BetaNews by David Harley
I spend a lot of time defending educational as opposed to purely technical solutions to security. Not that I don’t believe in the usefulness of technical solutions. However, there are many people in the security business who believe that education is a waste of time because it isn’t 100-percent effective. Unfortunately, you can make the very same argument against any technological solution. Randy Abrams and I discussed that conflict of ideas at some length in a paper for AVAR: see People Patching: Is User Education Of Any Use At All? And Robert Slade made some excellent points more recently in post Security unawareness.
Static passwords are a pretty good example of a technology that’s proved to be less than 100-percent effective time and time again, yet is considered effective enough to remain the authentication mainstay of many a web service. Well, I could argue that it’s not so much about effectiveness, as a trade-off between effectiveness in terms of privacy, and the cost of implementing better authentication mechanisms. But that’s a discussion for another time.
There’s a proverb to the effect that "if you give a man a fish, you feed him for a day: teach him to fish, and you feed him for a lifetime". While the provenance of that saw is obscure, it’s worth examining more closely in the context of security, though in that context it might be better recast as "If you show a man a phish, you prevent him from falling for that one: if you teach him to recognize phishing, you save yourself and him a lot of hassle". And, in fact we’ve written quite a lot about phishing in the past: "A Pretty Kettle of Phish"; "Phish Phodder: Is User Education Helping or Hindering?"
Quite a Few Pairs of Breaches
However, right now I’d like to apply that thought to password practice, an area of security (or, more accurately, privacy) that’s probably of more immediate concern to many of us. In a year that’s so far been most notable for the number of major password breaches. On more than one occasion I’ve quoted Mark Burnett’s top 500 and one or two similar lists of the most-overused passwords, and recently I’ve noted quite a few journalists citing their own lists, but what does this teach the man-in-the-street (especially if he’s doing his on-line banking on his smartphone as he wanders down to the pub) about password choices?
Well, it isn’t entirely useless, or I wouldn’t have bothered in the first place (or, to be precise, the second place, i.e. at the time of the Yahoo! debacle. Sometimes a service uses the ‘three strikes and out’ approach to regulating password or passcode authentication, suspending an account after three failed attempts to supply the correct password, so avoiding the top 25  (say) most over-used passwords may be good enough to secure the account from an opportunistic attack using common passwords, and even where the suspension is automatically lifted after a preset time, that does at least reduce the potential effectiveness of a dictionary or guessing attack. But simply listing the top umpteen bad passwords isn’t really teaching anyone anything about password selection except to avoid a tiny handful of the billions of possible passwords and passphrases.
Horrific Heuristic
And in fact, that tiny handful, whether it’s 25 or 10,000, remains tiny even when you measure it against the millions of combinations that will be tried in a determined dictionary attack. In a recent Securiteam blog, I compared the two approaches in these terms. If you simply offer a list of bad passwords ordered by prevalence, you are effectively offering a series of micro-heuristics like this:
Don’t use ‘a’

Don’t use ‘aa’

Don’t use ‘aaa’

…

Don’t use ‘aaaaaaaaaaaaaaaaaaaaaaa’

Don’t use ‘b’

Don’t use ‘bb’
Valid heuristics, yes, but it saves an awful lot of typing just to say: "Don’t use any password consisting of a single character repeated N times". Or even "password is a really, really bad choice of password: it’s so obvious that everyone uses it, and letmein isn’t much better".
So let’s look again at that list of 25 passwords again. But rather than ranking them by how commonly they’re used (the sorted by prevalence column) let’s look at the alphanumeric order and see if that enables us to extract any heuristics more useful than "don’t use any of these 25 strings".
Sort of Sorted
Original Ranking Sorted by prevalence Sorted alphanumerically
1 password 111111
2 123456 1234
3 12345678 12345
4 1234 123456
5 qwerty 1234567
6 12345 12345678
7 dragon 2000
8 pussy 696969
9 baseball abc123
10 football baseball
11 letmein dragon
12 monkey football
13 696969 harley
14 abc123 jennifer
15 mustang jordan
16 michael letmein
17 shadow master
18 master michael
19 jennifer monkey
20 111111 mustang
21 2000 password
22 jordan pussy
23 superman qwerty
24 harley shadow
25 1234567 superman
Well, that’s interesting and maybe a little unexpected. In fact, it demonstrates the dangers of (1) using too small a dataset and (2) making assumptions about how applicable those data are in different contexts. Having done some analysis on purely numeric data as well as with larger password datasets, I know that the rule I mentioned above -- "Don’t use any password consisting of a single character repeated N times" -- is pretty sound in the context of both alphanumeric passwords and purely numeric strings (especially PINs -- Personal Identification Numbers: see Hearing a PIN drop and PIN Holes: Passcode Selection Strategies), but that heuristic isn’t specifically supported by this small dataset, where only one such password, 111111, is represented. So you’ll have to take my word for it that in larger datasets, other single character passwords (numeric and alphabetical) are indeed (over-)used and therefore bad choices.
Rules are Rules
A rule that does hold, however, is that passwords consisting of an ascending series of numbers starting at 1 are not a great or unique and original idea. The following all appear in our list above, all but one being in the top 6.
  • 1234
  • 12345
  • 123456
  • 1234567
  • 12345678
Curiously, 1234567 comes in at number 25. That may be related to the fact that many authentication mechanisms enforce (or used to enforce) a minimum of only six characters: people who take this easy route to selecting a password are not likely to go to seven characters if they only need six. A seven-character minimum is pretty unusual. However, when services started to get more password-conscious (or entropy-conscious), many started to use an eight-character minimum, which probably explains why 12345678 ranks so highly. 1234 is also very highly ranked in PIN prevalence data, by the way.
There may actually be two reasons why people favor this group of numeric strings.
  1. It’s not difficult to remember a simple increment-by-one series like this: all you have to do is remember when to stop.
  2. But you hardly need to remember the series at all: all you have to do on most computer keyboards is finger-step your way along the appropriate row of the keyboard. Which certainly also explains the presence of QWERTY, the first six alphabetical characters on the next row down on a standard keyboard. And yes, people do user QWERTYUIOP or a subset thereof when they need a longer password. In countries that use a slightly different layout on that row -- AZERTY, for example -- we see reports of the modified string or substring being used instead of a QWERTYUIOP substring. (See PIN Holes: Passcode Selection Strategies.)
What about 2000? Well, that’s too popular to be a good choice, of course. But why 2000? Probably because people quite often use memorable dates, even just a year where they can get away with 4 digits, as in the context of many PINs. However, it’s pretty safe to assume that memorable years (1066, 1492, 2000, 2001, any recent Olympic year) will be high on a password guesser’s list, and where an automated attack can be implemented, it doesn’t take long to cycle through all the possible 4-digit combinations.
Then there’s 696969. I have a theory about why that one is so popular, and while the popularity of pussy (which is also in this top 25) is no doubt because cat lovers need passwords too, there are several other words and phrases likely to be sex–related, including four-letter words, that aren’t in this list, but do turn up in several others. I’m not particularly prudish myself, but I would suggest that if you think that no one else ever used an obscenity or a word related to sexual practices as a password, you should think again.
There is just one mixed alphanumeric string in this list, abc123, but there are several others that turn up in other lists, including such venerable items as NCC1701, better known as the USS Enterprise. Well, you might want to avoid those two.
Back to the Drawing Board
So we have several sport-related passwords: clearly baseball and football are too popular to be a good idea, but you’ll find that other popular sports also make over-popular passwords (Michael and Jordan? Hmm…). But then, any word you’re likely to find in a dictionary is going to be guessed eventually (i.e. sooner rather than later) in an automated attack. We could look at the psychology behind the other choices of dictionary words that make up the rest of this list, but there doesn’t seem to be a lot of point to it.
Clearly, there isn’t much potential for useful heuristics in a top 25. So in an upcoming post, I’m going to abandon the Top Umpteen approach altogether and start again from the basics of sound password selection. If you’d like to try a more flippant approach, though, you might want to take a look at A Torrent of Abuse for an attempt at password advice through parody.
Remember, though, that any password is only as good as the service to which it gives access: it doesn’t matter how hard to guess it is, if the service provider is incapable of providing competent security to keep a competent password secure.
A Teasing Conclusion
So here’s a quick summary of the little that we can learn from this top 25:
  • Avoiding the most popular passwords is safer than using one of them, especially the top three. But avoiding even the top 100, 1,000, or 10,000 is only good enough if the authentication mechanism is well-implemented and your passwords are well-protected by the provider on its own systems.
  • Passwords, passphrases and PINs consisting of a single character repeated are very, very unsafe.
  • Any numeric or digital series ascending in increments of one or more is vulnerable to a guessing attack, a dictionary attack, or an algorithmic attack. So any substring of 0123456789 or abcdefghijklmnopqrstuvwxyz is likely to fail pretty quickly.
  • Any password – or passphrase – that can be found in a dictionary is easily crackable if the authentication mechanism allows a dictionary attack.
  • Passwords with a sexual connotation or using swearwords are very widely used, and therefore highly vulnerable to a guessing or dictionary attack.
In addition, a decent password manager saves you a lot of thinking in terms of generating a hard-to-crack password and reduces the temptation to re-use passwords and risk a cascade of breaches when one of your providers slips up, as so many have done recently. I’m looking at password management software at the moment, and while I’m reluctant to make too-specific recommendations, I’ll be trying to give you some idea of what to look for in password management in another forthcoming article.
Reprinted with permission
Photo Credit: Vlue/Shutterstock
David Harley BA CITP FBCS CISSP is an English IT security researcher, author/editor and consultant known for his prolific blogs and articles and his books on and research into topics like malware, Mac security, anti-malware product testing and management of email abuse. He works closely with ESET, where, since 2011, he has held the position of Senior Research Fellow.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)
Economy Hosting just Rs. 109/month for 12 months!

Popular Posts

  • Build the Mac Pro That You Wish Apple Released [Hackintosh]
    Build the Mac Pro That You Wish Apple Released [Hackintosh] : Last week Apple updated their Mac Pros to cutting-edge processors from 2010, e...
  • BD singer Porshi Scandal video download online
    BD singer Porshi BD singer Porshi video online BD singer Porshi  online Bangladeshi Chaneel I superstar singer Porshi recently released her ...
  • Curvy Girls of Miss Bumbum Brazil 2012
  • se l/e i ;ertoi' toi';t894t'4343
     EYAGA;P98 GTY;O' 98G/O; i; aiygt;a 90ghkhbkdhsl tie[ q[4890'8ihgxdhfs ;oa'9t hk4l ty'ae4t4 EYAGA;P98 GTY;O' 98G/O; i; a...
  • Sameeksha
  • Melyssa Grace: Hot Asian Import Model.
    Who Is Melyssa Grace? Quick Bio Name: Melyssa Grace Roberts Nickname: Mely Ethnicity: Filipina/German Profession: Model (Import) Birthdat...
  • Ankitha
  • Kay Valentine: Hot British Import Model.
    Kay Valentine Bio Quick Bio Name: Kay Valentine Nicknames: Princess Kay & Kay Veezy Ethnicity: Vietnamese/French Profession: Model (I...
  • Serangoon Road
    HBO's pioneer Asian series premiers this weekend By Nico Erle Ciriaco SINGAPORE CITY – Home Box Office (HBO) Asia announced in a press c...
  • Powering the Possible (Dell)
    Affording chances and other life skills By Earl D.C. Bracamonte Total solutions company Dell announced very recently that it will support t...

Categories

  • 1964
  • 3D frame resolution
  • 44th season
  • 4K technology
  • 60s theme
  • 84-inch LED
  • Abarat
  • Abbey Clancy
  • accessories
  • acqua
  • action
  • Aditi Gowarkar
  • Aditi Rao
  • adventure
  • agnes locsin
  • airlines
  • airplanes
  • Aisha
  • Aishwarya Rai
  • aklan
  • Alexandria Eissinger
  • Alia Bhatt
  • Alicia Machado
  • all-day
  • altro mondo
  • Amalia
  • american cuisine
  • Amisha Patel
  • Amrita Rao
  • Amy Jackson
  • Andrea Jeremiah
  • Aneh
  • anemia
  • Anika Kabir Shokh
  • Anjana Sukaani
  • Ankitha
  • Annelise Marie
  • anti-ageing
  • Anu Mehta
  • Anushka Sharma
  • apparel
  • Apple
  • appliances
  • Archana
  • Arpita Paul
  • art
  • art of dance
  • arte contemporanea
  • Asha Saini
  • asia pacific
  • asian
  • asians five nations tournament
  • aspen
  • Attahama Cheewanitchaphan
  • australian broadcasting corp
  • autumn
  • ayala center
  • Bag of Bones
  • ballet philippines
  • Bangladeshi Model
  • Bangladeshi Sexy Model
  • Bangladeshi Singer
  • bb pilipinas
  • bb. pilipinas
  • BD Model
  • beauty
  • beauty in giving
  • beddings
  • beds
  • Belarus
  • belt
  • beverly hills 6750
  • bgc
  • Bhavana
  • Bhuvaneshwari
  • biki
  • bikini
  • bio-oil
  • Bipasha Basu
  • Bisnis Lokal Go Online
  • bit.ly
  • blood disorder
  • book review
  • boracay
  • bp
  • bpci
  • breakfast
  • campaign
  • car seats
  • carriers
  • cause
  • ccp
  • cebu
  • Celina Jeitly
  • Certification
  • chef
  • childhope asia
  • children's joy foundation
  • Chitrangada Singh
  • christmas carol
  • cinema
  • cjfi
  • classical
  • Clive Barker
  • clothing
  • co-production
  • Cobie Smulders
  • collection
  • colors
  • comedy
  • competition
  • competitions
  • computer literacy
  • contact sports
  • contemporary
  • contest
  • contests
  • conveyances
  • coronation night
  • corporate social responsibility
  • corporate value
  • cqgq
  • CSR
  • cuisine
  • dance
  • Deeksha Seth
  • Deepika Padukone
  • deficiency
  • Dell
  • destination
  • destinations
  • detective noir
  • devices
  • Dhallywood Actress
  • Diana Monteiro
  • Diana Penty
  • digital products
  • dining
  • dive spots
  • Divya Bharathi
  • dockers
  • edna vida
  • elan awards
  • electronics
  • Elisha Cuthbert
  • Elle Evans
  • Emma Watson
  • Eragon
  • Erin Andrews
  • Evelyn Sharma
  • events
  • exhibit
  • f & b
  • fall
  • fashion
  • festivals
  • fila
  • filapinas
  • Filipina
  • film
  • foam
  • food
  • formulation
  • foundation
  • furnishings
  • gallery
  • garcia college of technology
  • gct
  • Geeta Basra
  • German brand
  • gianfranco pirrone
  • giselle
  • giselle sanchez
  • gkmbq
  • glorietta 5
  • gma 7
  • goo.gl
  • Google
  • grant
  • greenbelt 5
  • gusto kong maging beauty queen
  • H2O hotel
  • Hansika Motwani
  • hanupriya
  • Hazel Keech
  • hbo
  • hboasia
  • HD
  • Heera
  • high chroma texture
  • history
  • holiday
  • home
  • hot
  • iBT
  • IFBS
  • indigenous people
  • Indonesia
  • Indraja
  • initiative
  • installation art
  • international pageants
  • IPK
  • iron
  • Isha Chawla
  • italian
  • Japanese brand
  • jeff bridges
  • Jinri Park
  • john robert powers
  • Kajal Agarwal
  • Kajo
  • kalibo
  • kallery.net
  • Kamalini Mukharjee
  • Kamna Jatmalini
  • Kareena Kapoor
  • Katrina Kaif
  • Katy Perry
  • Kausha
  • Ken Follett
  • khaki
  • Kitami Masao
  • KLM
  • kristen stewart
  • kuh ledesma
  • Lambert Academic Publishing
  • LAP
  • Laura Baca
  • leather
  • Lee-Ann Roberts
  • lena gercke
  • life wear
  • linear atrophy
  • Lisa Haydon
  • mactan shangri-la
  • Mahima Chowdary
  • makati
  • malampaya
  • malaria
  • MAM
  • Mandakini
  • manila ocean park
  • Manjari
  • margie moran
  • Marian Rivera
  • Marika Baldini
  • marvel comics
  • Mary Elizabeth Winstead
  • mattresses
  • Maxim
  • mcjim
  • men
  • men's fashion
  • merck serono
  • Mette Munkø
  • Mila
  • minerals
  • Minisha Lambha
  • Minka Kelly
  • Minsk
  • Miss Supranational
  • miss world philippines
  • model
  • modern
  • modern art
  • moisturizer
  • Mounica Bedi
  • movie
  • movie review
  • mr jones
  • mutya johanna datul
  • mutya ng pilipinas
  • mvp bossing awards
  • mwp
  • My life
  • Nargis Fakhri
  • Natalie Pack
  • Navneet Kaur
  • Nayanatara
  • nbc tent
  • Neelam
  • Neha Jhulka
  • niccolo jose
  • Nikisha Patel
  • Nikitha
  • Nisha Kotari
  • nonoy froilan
  • nude
  • online voting
  • original
  • outreach
  • P2SMTP-LIPI
  • pageant
  • pageantry
  • pageants
  • painting
  • palawan
  • pants
  • Paris Hilton
  • paul morales
  • philippine volcanoes
  • pilipinas shell
  • Pillars of the Earth
  • planes
  • platinum award
  • poll
  • Pooja Bhatt
  • Pooja Gupta
  • Poonam Bajwa
  • popularity contest
  • Porshi
  • Porshi Scandal
  • Poses
  • powering the possible
  • Prachi Desai
  • precious lara quigaman
  • Preeti Jhingania
  • pret-a-porter
  • Priyanka Kotari
  • program
  • project
  • psfi
  • puerto princesa
  • PurCellin
  • quests
  • Raasi
  • Rachana Mourya
  • raffles hotel
  • raintree
  • Rambha
  • Ramya Krishna
  • Ramya Krishnan
  • range
  • readers digest
  • reality TV
  • Refaeli Bar
  • referrer spam
  • regza
  • rest in peace department
  • restaurant
  • restaurants
  • ripd
  • robert schwentke
  • Robin Scherbatsky
  • rock supremo
  • RTW
  • rugby
  • ryan renolds
  • SAKA
  • salagubang
  • salaminkera
  • Salli Villefrance
  • Saloni
  • Sam Kellet
  • Sameeksha
  • Sana Khan
  • sandra bullock
  • sangobion
  • Sara Carbonero
  • scarlett johansson
  • sculpture
  • sea air
  • search
  • Security
  • serangoon road
  • series
  • Sheela
  • shell
  • sheridan group
  • sheridan spa resort
  • Shireen
  • Shokh
  • Shradda Das
  • Shreya Saran
  • Shruthi Hassan
  • Shwetha Tiwari
  • sicily
  • Silk Smitha
  • Simran
  • SINAG
  • Sindu Tulani
  • singapore
  • skin damage
  • Sneha Ullal
  • social responsibility
  • solar entertainment
  • Sonam
  • Sonia Agarwal
  • sports palace
  • Stephen King
  • Stine Fabech
  • streetchildren
  • stretch marks
  • Sunny Leone
  • supplements
  • Susan
  • Swordless Samurai
  • technology
  • television
  • Thailand
  • the wicked
  • theater
  • Thomas Agatz
  • tiger air
  • tiger airways
  • Tim Clark
  • TOEFL
  • topical
  • toshiba
  • tourism
  • Tracy Chevalier
  • Translation
  • travel
  • treatment
  • tubbataha reef
  • Tulip Joshi
  • TV
  • Uditha Goswami
  • uip
  • Under The Dome
  • Uniqlo
  • Unknown
  • uratex
  • Urvashi Sharma
  • UT
  • Valentina Zambrotta
  • Varvara
  • Veda
  • Vedika
  • very hot
  • vijaya
  • Virgin Blue
  • visual arts
  • vitamins
  • well being
  • western philippines university
  • western visayas
  • wolverine
  • wood
  • world cup sevens
  • World Without End
  • x-men

Blog Archive

  • ►  2013 (137)
    • ►  September (15)
    • ►  August (21)
    • ►  July (8)
    • ►  June (12)
    • ►  May (8)
    • ►  April (6)
    • ►  March (13)
    • ►  February (33)
    • ►  January (21)
  • ▼  2012 (321)
    • ►  December (1)
    • ►  November (7)
    • ▼  October (49)
      • What to Do When Settlers of Catan Isn't Enough
      • 0 A.D. raises the game for open-source RTS
      • Brianna Acosta Miss Hawaii 2013
      • Miss Hawaii USA 2013
      • Miss Thong Swimsuit Competition in Macedonia
      • Miss Brazil USA Bikini Contest 2
      • MISS BRASIL 2013
      • MISS BRASIL 2012 - VENCEDORA
      • Miss Serbia Nikolina Bojić Resigns
      • Does your company help with certification? Dilbert...
      • Miss Russia 2012, Elizaveta Golovanova
      • Miss Venezuela Universe 2013, Gabriela Isler
      • Crowning Moment of Miss Vietnam 2012 Dang Thu Thao
      • MISS WORLD 2012 - WINNER - WEN XIA YU (MISS CHINA)
      • miss world 2012
      • Miss Teen World
      • korea & china superstar contest model bikini 35
      • Beauty of Russia 2012
      • Miss Vietnam World 2012 Vũ Thị Hoàng My-MW 2012
      • Miss Universe Bikini Competition 2012
      • Super Angry Birds is a physical controller for the...
      • Strategies to Win at Claw Grab Games [Video]
      • Bad passwords are worse than you think
      • How to Improve the Security of your WordPress Blog
      • The New MCSE: How to Successfully Build Your Micro...
      • CCNA Gamified: Learn Networking through the CCNA A...
      • Zagg Full-Body Protection Left My iPod Coated With...
      • MythTV library on Apple TV without a jailbreak
      • Oct 2012 Nikolina Bojic : Miss World Serbia 2013
      • Miss Nude Australia 2012 Cassandra Jane Melbourne ...
      • Download video clips with YouTube Mate
      • 'Your Amazon Cloud Drive and Cloud Player subscrip...
      • Best music and MP3 downloader apps for Android
      • How I Built the Media Center of My Dreams for Unde...
      • CCIE DC Written and Nexus Switching Videos are Bot...
      • Force an Android Device to Check for a System Upda...
      • Giving the Nexus 7 HD video recording
      • Ask Slashdot: Actual Best-in-Show For Free Anti Vi...
      • Testing 30 brands of batteries
      • Save Time on Family Tech Support by Sending Them Y...
      • Token authentication for Gmail using a eZ430 Chron...
      • Most embarrassing moment ever in Beauty Contest
      • Curvy Girls of Miss Bumbum Brazil 2012
      • Miss Bumbum Brasil 2012
      • Use Google Authenticator without the Phone
      • CodeAcademy adds Python to the list of languages y...
      • Day 5 of Google’s 25 billion downloads celebration...
      • The Best Tools for Uploading Files to Amazon Glacier
      • Helping the World to Teach
    • ►  September (32)
    • ►  August (44)
    • ►  July (69)
    • ►  June (113)
    • ►  April (3)
    • ►  February (1)
    • ►  January (2)
  • ►  2011 (42)
    • ►  December (2)
    • ►  November (4)
    • ►  September (1)
    • ►  August (21)
    • ►  July (2)
    • ►  June (1)
    • ►  May (5)
    • ►  April (6)
Powered by Blogger.

About Me

Unknown
View my complete profile