{"id":104,"date":"2009-03-16T01:31:27","date_gmt":"2009-03-16T07:31:27","guid":{"rendered":"http:\/\/www.digitallachance.com\/blog\/?p=104"},"modified":"2009-03-16T01:31:27","modified_gmt":"2009-03-16T07:31:27","slug":"the-importance-of-password-audits","status":"publish","type":"post","link":"http:\/\/digitallachance.com\/blog\/2009\/03\/the-importance-of-password-audits\/","title":{"rendered":"The importance of password audits"},"content":{"rendered":"<p>Have you ever tried to crack your network user&#8217;s passwords?\u00a0 Why would you do that you ask?\u00a0 Simple, compliance check is one reason.\u00a0 The other is to better understand what is possible and what kind of password your users are using.\u00a0 In this post, I&#8217;ll discuss why it is a very good idea to do periodic password audits in your network.<\/p>\n<p>You might might think that the idea of running a password cracking program on your network users is a waste of time.\u00a0 In fact, you have to remember that if the bad guys are most likely to use that type of tool, you should use it first.\u00a0 That way you will know what a black hat will be able to get out our your password database.\u00a0 Here are a few reasons why you should do regular password audits.<\/p>\n<p>You should not have the false comfort that your network is safe just because you have turned on <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc875814.aspx\" target=\"_blank\">complex password group policy in active directory<\/a>.\u00a0 The rules of complex password in active directory are as follow:<\/p>\n<ul>\n<li>The password is at least six characters long.<\/li>\n<li>The password contains characters from at least three of the following five categories:\n<ul>\n<li>English uppercase characters (A &#8211; Z)<\/li>\n<li>English lowercase characters (a &#8211; z)<\/li>\n<li>Base 10 digits (0 &#8211; 9)<\/li>\n<li>Non-alphanumeric (For example: !, $, #, or %)<\/li>\n<li>Unicode characters<\/li>\n<\/ul>\n<\/li>\n<li>The password does not contain three or more characters from the user&#8217;s account name.<\/li>\n<\/ul>\n<p>Using those rules, that means that the password <strong>Password1<\/strong> is actually a valid password.\u00a0 How good of a password is that?\u00a0 This a valid password because active directory does not actually do a password complexity check.\u00a0 What it does is more accurately described as a password constraint check.\u00a0 The idea of complex passwords is that it should force users to not use dictionary words as their passwords.\u00a0 Since it is not practical to have a full dictionary in Active Directory to make sure that passwords are not in the dictionary, the designers simply impose constraints on what your password should be like.\u00a0 Hence, the complex password group policy constraints as described above.<\/p>\n<p>Another aspect of passwords is that people will tend to re-use the same password everywhere they can.\u00a0 What this means is that the password is only as strong as the weakest link.\u00a0 Namely, if you use the same password on a web site that is easily compromised, the black hat will try the newly discovered password on your bank account as well, knowing full well that it is likely going to be the same password.<\/p>\n<p>If you are not willing, or allowed to do a password audit on your network, you really should take a look a studies that were done on passwords that have been revealed because of security breaches.\u00a0 There has been two recent incidents that are worthy of reading.\u00a0 One is an article on Dark Reading (<a href=\"http:\/\/www.darkreading.com\/blog\/archives\/2009\/02\/phpbb_password.html\" target=\"_blank\">http:\/\/www.darkreading.com\/blog\/archives\/2009\/02\/phpbb_password.html<\/a>) about the phpbb.com web site hack.\u00a0 The other one is from Bruce Schneier who did an analysis on passwords that were published by people behind a fake MySpace web page used in a phishing campain.<\/p>\n<p>Whenever possible, you should use some kind of two-factor authentication, such as smart cards or an RSA token.<\/p>\n<p>One of the best known password cracking software is L0pthCrack, which used to be owned by Symantec.\u00a0 L0pthCrack has recently been <a href=\"http:\/\/searchsecurity.techtarget.com\/video\/0,297151,sid14_gci1350713,00.html?track=sy160\" target=\"_blank\">re-acquired<\/a> by its original authors.\u00a0 They intend to update the venerable software and start selling it again.\u00a0 There is other software that can be purchased (and some free) that can help you audit your user&#8217;s password.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever tried to crack your network user&#8217;s passwords?  Why would you do that you ask?  Simple, compliance check is one reason.  The other is to better understand what is possible and what kind of password your users are using.  In this post, I&#8217;ll discuss why it is a very good idea to do periodic password audits in your network.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[9],"tags":[38,51],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The importance of password audits - IT A Digital Life<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/digitallachance.com\/blog\/2009\/03\/the-importance-of-password-audits\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"3 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/digitallachance.com\/blog\/#website\",\"url\":\"https:\/\/digitallachance.com\/blog\/\",\"name\":\"IT A Digital Life\",\"description\":\"All things digital\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/digitallachance.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/digitallachance.com\/blog\/2009\/03\/the-importance-of-password-audits\/#webpage\",\"url\":\"http:\/\/digitallachance.com\/blog\/2009\/03\/the-importance-of-password-audits\/\",\"name\":\"The importance of password audits - IT A Digital Life\",\"isPartOf\":{\"@id\":\"https:\/\/digitallachance.com\/blog\/#website\"},\"datePublished\":\"2009-03-16T07:31:27+00:00\",\"dateModified\":\"2009-03-16T07:31:27+00:00\",\"author\":{\"@id\":\"https:\/\/digitallachance.com\/blog\/#\/schema\/person\/8a2f0b2a18af80d71541deadfac4d02f\"},\"breadcrumb\":{\"@id\":\"http:\/\/digitallachance.com\/blog\/2009\/03\/the-importance-of-password-audits\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/digitallachance.com\/blog\/2009\/03\/the-importance-of-password-audits\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/digitallachance.com\/blog\/2009\/03\/the-importance-of-password-audits\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"http:\/\/digitallachance.com\/blog\/2009\/03\/the-importance-of-password-audits\/\",\"url\":\"http:\/\/digitallachance.com\/blog\/2009\/03\/the-importance-of-password-audits\/\",\"name\":\"The importance of password audits\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/digitallachance.com\/blog\/#\/schema\/person\/8a2f0b2a18af80d71541deadfac4d02f\",\"name\":\"Francois\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/digitallachance.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"http:\/\/0.gravatar.com\/avatar\/ce2ee0649f3fb6a643ffff9a9f1e63e4?s=96&d=mm&r=g\",\"caption\":\"Francois\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/posts\/104"}],"collection":[{"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/comments?post=104"}],"version-history":[{"count":0,"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/posts\/104\/revisions"}],"wp:attachment":[{"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/media?parent=104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/categories?post=104"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/tags?post=104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}