STORAGE OF PASSWORDS
If you have to choose between weak passwords that your users can memorize and strong passwords that your users must write down, have readers write down passwords and store the information securely. Train users to store their written passwords in a secure place — not on keyboards or in easily cracked password-protected computer files. Users should store a written password in either of these locations:
- A locked file cabinet or office safe
- Full (whole) disk encryption which can prevent an intruder from ever accessing the OS and passwords stored on the system.
- A secure password management tool such as
- LastPass
- Password Safe, an open source software originally developed by Counterpane
PASSWORD POLICIES
As an ethical hacker, you should show users the importance of securing their passwords. Here are some tips on how to do that:
- Demonstrate how to create secure passwords. Refer to them as passphrases because people tend to take passwords literally and use only words, which can be less secure.
- Show what can happen when weak passwords are used or passwords are shared.
- Diligently build user awareness of social engineering attacks.
- Enforce (or at least encourage the use of) a strong password-creation policy that includes the following criteria:
- Use upper- and lowercase letters, special characters, and numbers. Never use only numbers. Such passwords can be cracked quickly.
- Misspell words or create acronyms from a quote or a sentence. For example, ASCII is an acronym for American Standard Code for Information Interchange that can also be used as part of a password.
- Use punctuation characters to separate words or acronyms.
- Change passwords every 6 to 12 months or immediately if they’re suspected of being compromised. Anything more frequent introduces an inconvenience that serves only to create more vulnerabilities.
- Use different passwords for each system. This is especially important for network infrastructure hosts, such as servers, firewalls, and routers. It’s okay to use similar passwords — just make them slightly different for each type of system, such as SummerInTheSouth-Win7 for Windows systems and Linux+SummerInTheSouth for Linux systems.
- Use variable-length passwords. This trick can throw off attackers because they won’t know the required minimum or maximum length of passwords and must try all password length combinations.
- Don’t use common slang words or words that are in a dictionary.
- Don’t rely completely on similar-looking characters, such as 3 instead of E, 5 instead of S, or ! instead of 1. Password-cracking programs can check for this.
- Don’t reuse the same password within at least four to five password changes.
- Use password-protected screen savers. Unlocked screens are a great way for systems to be compromised even if their hard drives are encrypted.
- Don’t share passwords. To each his or her own!
- Avoid storing user passwords in an unsecured central location, such as an unprotected spreadsheet on a hard drive. This is an invitation for disaster. Use Password Safe or a similar program to store user passwords.
OTHER COUNTERMEASURES