Free

Password Management Protocol vulnerabilities - Essay Example

Comments (0) Cite this document
Summary
Password is one thing that can prevent other users from accessing various accounts networks and what is very important all kinds of confidential information. Such information should be protected and passwords are quite good solution for the protecting it from the unauthorized…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Password Management Protocol vulnerabilities
Read TextPreview

Extract of sample "Password Management Protocol vulnerabilities"

Password Management Protocol vulnerabilities By of the affiliation Department’s Paper’s Password is one thing that can prevent other users from accessing various accounts networks and what is very important all kinds of confidential information. Such information should be protected and passwords are quite good solution for the protecting it from the unauthorized access. However, hackers can find them and steal using some software. There are many, even in the Internet, software which can help even amateurs in this business to steal passwords. We will through the usage of one application that can show and copy passwords saved in the browser. Many users use autocompleting in their browser and this main threat for the password security and we will show It on the example of one non-malicious software called “WebBrowserpassview”.
We will analyze the password storage protocol used in the browser like Google Chrome, Opera, Firefox Mozilla, Seamonkey. These browsers store their passwords almost equally and their passwords can be revealed to the hacker with the help of the tool we mentioned above. Because mechanism of the encrypting passwords is very weak and even the simplest applications can retrieve them from their register, moreover, this application has good interface and getting passwords can present problem for the hacker, because it needs physical contact with the target computer, however, there are thousands modifications of this software which have hidden interface and after the running can send all passwords on the email or FTP-server of the hacker. Therefore saving of the passwords in the browser is quite doubtful method of password storage (10 Most Popular Password Cracking Tools 2014).
Functioning of the “WebBrowserPassview”
Here we can see good interface for the passwords viewing and various operations with them. This application allow user to save them to the file. This file can be copied to other emails and then used in malicious activities like the accessing some bank-accounts without the two-step authorization that requires special key that system sends to the cell-phone of the user or to the email.
Here this application presented all our passwords with the description of fields in which they were entered. It helps hacker easily reenter all these passwords to the necessary fields.
There are many ways to protect computer from such attacks. The first way – avoiding downloading some software, regardless from the content and specifications written on the site, if the site is not Microsoft.com or other associated site to the OS user use. Creators of the password storage systems can use special encrypting protocols which will help to defend passwords from retrieving with some application. Moreover, developers can use key file that will give access to the passwords, we mean any file in the system that will be necessary for accessing passwords and after the beginning of the work with such application this file give access to all passwords, otherwise they will be hidden and encrypted. For all users who use the browsers they can buy or just download free version of the “KeePass Password Safe. This application helps to save passwords from the copying and send them to the FTP-server through the protected chanel and the storage of the password is protected with the two-stage protection with the Master-Password and the special file with the encoding key which should exist on the computer to access passwords, so user can take this file on the flash-storage and access his/her passwords on other computers (KeePass Password Safe 2011).
References
KeePass Password Safe 2011, Viewed 16 January 2015,
10 Most Popular Password Cracking Tools 2014, Viewed 16 January 2015,
http://resources.infosecinstitute.com/10-popular-password-cracking-tools/ Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Password Management Protocol vulnerabilities Essay”, n.d.)
Password Management Protocol vulnerabilities Essay. Retrieved from https://studentshare.org/information-technology/1674220-password-management-protocol-vulnerabilities
(Password Management Protocol Vulnerabilities Essay)
Password Management Protocol Vulnerabilities Essay. https://studentshare.org/information-technology/1674220-password-management-protocol-vulnerabilities.
“Password Management Protocol Vulnerabilities Essay”, n.d. https://studentshare.org/information-technology/1674220-password-management-protocol-vulnerabilities.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Password Management Protocol vulnerabilities

Password Cracker

..., was able to uncover 85 percent of office passwords within twenty minutes”, TechTarget. A tool (cracker) that uses Brute-force technique In this section, we will describe Hydra which is a very powerful brute force password cracker. According to Faircloth (278), it supports most of the network login protocols which also run on network devices.” The complete list is as follows, as given by Hauser: AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle, PC-Anywhere,...
16 Pages(4000 words)Research Paper

Password Cracking System

...it is possible to crack this password hash as well but it is comparatively much tougher than cracking a LM. If the password attempted to be cracked is long and also complex, a hacker may need days to crack it if its hashtag is in the NT format. LM hashes have been discontinued since the invention of Windows 2000. Thus it may be said that the security of Windows has increased considerably. Protocols for Authentication Windows 2000 and the windows that came after it used four authentication protocols. Kerberos, LAN Manager, NTLM and NTLMv2. Since LAN Manager was the original protocol, if it gets compromised or its traffic...
25 Pages(6250 words)Research Paper

Password Cracking Systems

...as well as examining routing protocols (SecTools, 2011) and (Montoro, 2009). Image Source: http://www.oxid.it/ca_um/ THC Hydra THC Hydra is a high speed network verification cracker that manages a lot of diverse activities in general. As we need to brute force secret password crack a remote verification service, Hydra is frequently the contrivance of preference. It is to able to carry out fast dictionary attacks beside over 30 network communication protocols, comprising ftp, telnet, https, http, smb, numerous databases as well as a lot of others (SecTools, 2011). Image Source: http://www.thc.org/thc-hydra/ Aircrack Aircrack is a speedy system for cracking...
20 Pages(5000 words)Research Paper

Cyber Security Vulnerabilities

...three levels of users i.e. beginners, intermediate and professionals (Whitman, Mattord , n.d). Each group is addressed by customized user awareness training sessions that also includes computer based testing environment. Some of the critical issues that must be addressed by the IT manager that utilize organization’s application and wired and wireless network vulnerabilities are explained in detail below: Phishing A simple definition is available on network dictionary which states that ” it is a scam to steal valuable information such as credit card and social security numbers, user IDs and passwords”. The data is the blood life of every organization; precisely financial institutes...
14 Pages(3500 words)Essay

Password Management Protocol

.... The protocol just allows the password protection, the password could be as weak as even consists of a single character/digit. Furthermore, the protocol also allows similar and shared passwords to apply on MS Outlook account. This enhances vulnerability of password broken into the MS Outlook account through guess. References Lowe, Gavin. 2004. Analysing protocols subject to guessing attacks. Journal of Computer Security. Bloomberg, L., Paul. 2010. Passwords security protocols. Available at:...
3 Pages(750 words)Assignment

Network Vulnerabilities:

...NETWORK VULNERABILITIES Network Vulnerabilities Affiliation Introduction This paper presents an overview of some of the common network vulnerabilities. This research will summarize 10 common network vulnerabilities into a table. This table will be divided into three columns. First column represents name of vulnerability, second column offers the description of that vulnerability and last column outlines the solution for the issue. No Vulnerability Description Control 1 USB thumb drives USB data travel drives are one of the main reasons of compromising the network security. Most of people make use of them to copy their sensitive information from one system to another and use it in a wrong way. We can protect our system by changing... ...
2 Pages(500 words)Essay

Simple Network Management Protocol

For instance, network operating on SNMP will be associated with three components i.e. managed devices, agents and network management system (NMS). A managed device can be any node configured with SNMP within the network. The primary task of these managed devices is to perform information management in order to publish the information on the NMS (Protocols guide: TCP/IP protocols: Application layer protocols: SNMP: Simple network management protocol. 2007). Example of managed devices includes routers, hubs, switches etc. Moreover, an agent is considered as an application that is installed in a managed device. In addition, an agent also translates information that will be compatible with SNMP. Furthermore, NMS publish information re...
2 Pages(500 words)Essay

Vulnerabilities

...Full Paper Vulnerabilities Electronic mail is the most common way of communicating messages to the sender. However, there are many associated threats and vulnerabilities that may breach any one of the three security fundamentals i.e. confidentiality, integrity and availability. Accordingly, during transit, if the message is modified, integrity and confidentiality will be breached. Similarly, non-repudiation issues will also occur, if there is no Public Key Infrastructure (PKI) that is operated by separate third parties. Likewise, the PKI is associated with digital certificates issued from a corporate authority i.e. Certificate Authority (CA) and is considered to be the most efficient control in terms of...
2 Pages(500 words)Research Paper

SQL Injection Vulnerabilities

...access, and execution of commands on the operating system through the out-of-bands connections. A command line user interface is employed by the sqlmap. MY OPINION I agree with the article’s advancement that the information regarding the SQL injection has been highly technicalized to suit only the professional web developers and not to suit the common users such as the administrators. There is need for the information to be simplified in a manner that would enable the everyday consumers of information technology to be aware of the SQL injection vulnerabilities, causes, impacts and the available techniques and tools for avoiding, preventing or managing any compromise to the database system. The...
5 Pages(1250 words)Research Paper

Threats And Vulnerabilities Analysis

...Threats And Vulnerabilities Analysis Figure showing Vulnerability Assessment Matrix   Object of Vulnerability   Physical Cyber Human / Social Enabling Infrastructure Attributes: Hardware (Data Storage, Input/Output, Clients, Servers), Network and Communications, Locality Software, Data, Information, Knowledge Staff, Command, Management, Policies, Procedures, Training, Authentication Ship, Building, Power, Water, Air, Environment Properties Leading to Vulnerabilities Design / Architecture Singularity         Uniqueness     inadequate security awareness   Centrality  Centralized network monitoring and control       Homogeneity standardized network architecture       Separability... ...
6 Pages(1500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Password Management Protocol vulnerabilities for FREE!

Contact Us