[2680] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Not so much a bug as a warning of new brute force attack

daemon@ATHENA.MIT.EDU (Shaun Lowry)
Tue Jun 4 18:57:41 1996

Date:         Tue, 4 Jun 1996 10:12:13 +0100
Reply-To: Shaun Lowry <s.lowry@march.co.uk>
From: Shaun Lowry <shaunl@march.co.uk>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
In-Reply-To:  <Pine.SOL.3.93.960603144707.25688A-100000@dazed.nol.net> from
              "Brett L. Hawn" at Jun 3, 96 02:49:03 pm

"Brett L. Hawn" <blh@nol.net> wrote:

>You can lead a user to a good password but you can only make them use it for
>so long.

Is this not desirable?  The longer they keep that good password, the worse it
gets.  Make them choose another good password!

>Not to mention anyone with the time and desire can create a fairly
>nifty 'dictfile' like I did a few years back. All it takes is some simple
>brain power and a LOT of disk space, a quick file that prints all variations
>of 5-8 charater length combinations to a file. I stopped mine at 238megs and
>it was still going strong.

When talking in terms of attacking a daemon across a relatively
low-bandwidth network (as we were), a dictionary attack on 238Mb of
passwords is a) going to take a long time and b) hopefully won't go
unnoticed.

Agreed, if you have the encrypted passwords locally and have plenty of
CPU time to spare, knock yourself out.  If someone *really* wants to
crack a publically accessible account on your system they will, but this
implies a finely targetted attack.  Most attackers will ask themselves
the question "Where can I get in easily?" rather than "How do I get in
here?"

>Brett

        Shaun.

--
Shaun Lowry           | March Systems Ltd.,           http://www.march.co.uk/
PGP Key available     | 14 Brewery Court, High St.,
from key servers or   | Theale, UK. RG7 5AJ
via e-mail on request | +44 1734 304224

home help back first fref pref prev next nref lref last post