Password Patterns- An Analysis

23
1 Password Patterns – An Analysis Dr. Emin Islam Tatlı Twitter: @eitatli [email protected] 25 April 2012

Transcript of Password Patterns- An Analysis

Page 1: Password Patterns- An Analysis

1

Password Patterns – An Analysis

Dr. Emin Islam Tatlı

Twitter: @eitatli

[email protected]

25 April 2012

Page 2: Password Patterns- An Analysis

2

Password Patterns – An AnalysisOverview

1. Password Fiasco (Leakage of more than 32 M plain text passwords)

2. Password Analysis - Imperva

3. Password Analysis – Password Patterns

4. Conclusion

Page 3: Password Patterns- An Analysis

3

Password Leakagerockyou.com hacked

* Referenced from http://techcrunch.com

Page 4: Password Patterns- An Analysis

4

Password Leakagerockyou.com plaintext password are online

Page 5: Password Patterns- An Analysis

5

Password PatternsFTC fines RockYou

Page 6: Password Patterns- An Analysis

6

Password AnalysisAnalysis of Imperva - Distribution•Consumer Password Worst Practices:

http://www.imperva.com/docs/WP_Consumer_Password_Worst_Practices.pdf

Page 7: Password Patterns- An Analysis

7

Password AnalysisAnalysis of Imperva – Key Findings

Page 8: Password Patterns- An Analysis

8

Password AnalysisAnalysis of Imperva – Common Passwords

Page 9: Password Patterns- An Analysis

9

Password PatternsPassword Complexity

What about security of

z6iFk#rdlr vs. TØpsecret.

???

Randomly generated Consists of certain patterns

(e.g. dictionary word, ending

with “.”)

Page 10: Password Patterns- An Analysis

10

Password PatternsThe Analysis

• Dual and Triple Concatenation of [:alpha:], [:digit:] and [:punct:] characters

• Replacement of [:alpha:] => [:digit:] and [:punct:]

• Special patterns

• Frequency of the Symbols

Page 11: Password Patterns- An Analysis

11

Password Patterns[:alpha:], [:digit:] and [:punct:] characters

Page 12: Password Patterns- An Analysis

12

Password PatternsNo Concatenation

Page 13: Password Patterns- An Analysis

13

Password PatternsDual Concatenation

Page 14: Password Patterns- An Analysis

14

Password PatternsDual Concatenation – cont.

Page 15: Password Patterns- An Analysis

15

Password PatternsTriple Concatenation

Page 16: Password Patterns- An Analysis

16

Password PatternsReplacement Pattern

Page 17: Password Patterns- An Analysis

17

Password PatternsSome Special Patterns

Page 18: Password Patterns- An Analysis

18

Password PatternsFrequency of the Symbols

Page 19: Password Patterns- An Analysis

19

Password PatternsPassword Cracking - Methods

• Brute-Force Attacks

• Dictionary Attacks

Page 20: Password Patterns- An Analysis

20

Password PatternsPassword Cracking – Tools - I

Page 21: Password Patterns- An Analysis

21

Password PatternsPassword Cracking – Tools - II

Page 22: Password Patterns- An Analysis

22

Password PatternsThe Results in Conclusion

•The most commonly used dual concatenation of alpha-digit-punct characters is

“alpha+digit” with 30%.

•The most commonly used triple concatenation of alpha-digit-punct characters is

“alpha+punct+digit” with 0.57%.

•For the replacement pattern, replacing the letter i or l with the number “1” is the

most commonly used pattern.

•The most commonly used special character is . (point).

•Password patterns might be the next generation of dictionary attacks.

•Do not choose and use any password based on a common pattern.

Page 23: Password Patterns- An Analysis

23

•Password Patterns:

http://www.architectingsecurity.com/2010/09/11/password-patterns/

References