slides/slides01.tex
changeset 99 77125c0496e6
parent 98 3d585e603927
child 100 62b66cb088f6
equal deleted inserted replaced
98:3d585e603927 99:77125c0496e6
  1017 \mode<presentation>{
  1017 \mode<presentation>{
  1018 \begin{frame}[c]
  1018 \begin{frame}[c]
  1019 \frametitle{\begin{tabular}{c}Unix Passwords\end{tabular}}
  1019 \frametitle{\begin{tabular}{c}Unix Passwords\end{tabular}}
  1020 
  1020 
  1021 \begin{itemize}
  1021 \begin{itemize}
  1022 \item passwords are \alert{\bf not} stored in clear text
  1022 \item passwords must \alert{\bf not} be stored in clear text
  1023 \item instead \texttt{/etc/shadow} contains
  1023 \item instead \texttt{/etc/shadow} contains
  1024 \end{itemize}
  1024 \end{itemize}
  1025 
  1025 
  1026 {\small
  1026 {\small
  1027 \texttt{name:\$1\$QIGCa\$/ruJs8AvmrknzKTzM2TYE.:other\_info}
  1027 \texttt{name:\$1\$QIGCa\$/ruJs8AvmrknzKTzM2TYE.:other\_info}
  1041 % http://ubuntuforums.org/showthread.php?p=5318038
  1041 % http://ubuntuforums.org/showthread.php?p=5318038
  1042 
  1042 
  1043 \end{frame}}
  1043 \end{frame}}
  1044 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
  1044 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
  1045 
  1045 
       
  1046 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
  1047 \mode<presentation>{
       
  1048 \begin{frame}[c]
       
  1049 \frametitle{\begin{tabular}{@ {}c@ {}}Plain-Text Passwords\end{tabular}}
       
  1050 
       
  1051 \pause
       
  1052 \small\textcolor{gray}{On 25 September 2012, a report on a data breach at IEEE:}
       
  1053 
       
  1054 
       
  1055 \begin{itemize}
       
  1056 \item IEEE is a standards organisation (not-for-profit) 
       
  1057 \item many standards in CS are by IEEE\medskip
       
  1058 \item 100k plain-text passwords were recorded in logs
       
  1059 \item the logs were openly accessible on their FTP server
       
  1060 \end{itemize}\bigskip
       
  1061 
       
  1062 \begin{flushright}\small
       
  1063 \textcolor{gray}{\url{http://ieeelog.com}}
       
  1064 \end{flushright}
       
  1065 
       
  1066 \only<3->{
       
  1067 \begin{textblock}{11}(3,2)
       
  1068 \begin{tikzpicture}
       
  1069 \draw (0,0) node[inner sep=2mm,fill=white, ultra thick, draw=red, rounded corners=2mm] 
       
  1070 {\normalsize\color{darkgray}
       
  1071 \begin{minipage}{7.5cm}\raggedright\small
       
  1072 \includegraphics[scale=0.6]{pics/IEEElog.jpg}
       
  1073 \end{minipage}};
       
  1074 \end{tikzpicture}
       
  1075 \end{textblock}}
       
  1076 
       
  1077 \end{frame}}
       
  1078 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
  1079 
       
  1080 
       
  1081 
       
  1082 
  1046 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  1083 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  1047 \mode<presentation>{
  1084 \mode<presentation>{
  1048 \begin{frame}[c]
  1085 \begin{frame}[c]
  1049 \frametitle{\begin{tabular}{c}Password Blunders\end{tabular}}
  1086 \frametitle{\begin{tabular}{c}Other Password Blunders\end{tabular}}
  1050 
  1087 
  1051 
  1088 
  1052 \begin{itemize}
  1089 \begin{itemize}
  1053 \item in late 2009, when an SQL injection attack against online games 
  1090 \item in late 2009, when an SQL injection attack against online games 
  1054 service RockYou.com exposed 32 million \alert{plaintext} passwords
  1091 service RockYou.com exposed 32 million \alert{plaintext} passwords
  1060 % linkedIn password
  1097 % linkedIn password
  1061 % http://erratasec.blogspot.co.uk/2012/06/confirmed-linkedin-6mil-password-dump.html
  1098 % http://erratasec.blogspot.co.uk/2012/06/confirmed-linkedin-6mil-password-dump.html
  1062 \end{itemize}\medskip
  1099 \end{itemize}\medskip
  1063 
  1100 
  1064 \small
  1101 \small
  1065 Web user maintains 25 separate accounts but uses just 6.5 passwords
  1102 (web user maintains 25 separate accounts but uses just 6.5 passwords.)
  1066 
  1103 
  1067 \end{frame}}
  1104 \end{frame}}
  1068 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
  1105 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
  1069 
  1106 
  1070 %For instance, SHA512crypt, which is included in Mac OS X and most Unix-based operating systems, passes text through 5,000 iterations, a %hurdle that would have limited Gosney to slightly less than 2,600 guesses per second. The Bcrypt algorithm is even more computationally %expensive, in large part because it subjects text to multiple iterations of the Blowfish cipher that was deliberately modified to increase the %time required to generate a hash. PBKDF2, a function built into Microsoft's .Net software developer framework, offers similar benefits.
  1107 %For instance, SHA512crypt, which is included in Mac OS X and most Unix-based operating systems, passes text through 5,000 iterations, a %hurdle that would have limited Gosney to slightly less than 2,600 guesses per second. The Bcrypt algorithm is even more computationally %expensive, in large part because it subjects text to multiple iterations of the Blowfish cipher that was deliberately modified to increase the %time required to generate a hash. PBKDF2, a function built into Microsoft's .Net software developer framework, offers similar benefits.