Bruteforce basic presentation_file - linx

13
BRUTE FORCE, DICTIONARY ATTACK, AND THE IMPLEMENTATION Linggar Primahastoko IDSECCONF 2011

description

 

Transcript of Bruteforce basic presentation_file - linx

Page 1: Bruteforce basic presentation_file - linx

BRUTE FORCE, DICTIONARY ATTACK,AND THE IMPLEMENTATION

Linggar PrimahastokoIDSECCONF 2011

Page 2: Bruteforce basic presentation_file - linx

BACKGROUND

Public Information Sensitive Secured System

Page 3: Bruteforce basic presentation_file - linx

WHY ?

SQL INJECTION X REMOTE FILE INCLUSION X DIRECT URL ACCESS X …. X …. X DICTIONARY ATTACK ? BRUTE FORCE ?

Page 4: Bruteforce basic presentation_file - linx

BRUTE FORCE

TRY THE VARIETY KEYS

Page 5: Bruteforce basic presentation_file - linx

BRUTE FORCE

Page 6: Bruteforce basic presentation_file - linx

LIMITING THE BRUTE FORCE

Page 7: Bruteforce basic presentation_file - linx

DICTIONARY ATTACK

TRY THE POSSIBLE KEYS

Page 8: Bruteforce basic presentation_file - linx

DICTIONARY ATTACK

Page 9: Bruteforce basic presentation_file - linx

Implementation

Looking for the wrong sign Check that there are no wrong sign if it's true Make the automation

Page 10: Bruteforce basic presentation_file - linx

system

keys

attacker1. Looking for the wrong sign

2. G

et th

e ke

y on

e by

one

3. Try the key

4. if there is a wrong sign,back to second step

5. if there is no wrong sign,save the key and exit

Page 11: Bruteforce basic presentation_file - linx

The Enemies

Connection Firewall Captcha Limit Login Attempt Time

Page 12: Bruteforce basic presentation_file - linx

Conclusions

Simple way to make a simple brute force attack Need more additional way to secure the system No system that 100% secure

Page 13: Bruteforce basic presentation_file - linx

THANK YOU