Security Basics mailing list archives
Highlighting weak password dangers
From: WALI <hkhasgiwale () gmail com>
Date: Wed, 24 Jan 2007 21:15:46 +0400
I want to highlight the danger of using weak passwords on servers and users admin desktops. I have tested TSgrinder with a basic dictionary Brute Force to access Remote Desktop exploit on both servers and desktops. The problem here is that when connected to domain, the Account Lockout feature disables the account quite soon. I can only show the exploit on machines not connected to the domain where Domain Security policy doesn't flow down.
What are other interesting and intriguing ways to present this problem? I also need a system to do Passwords Audit on my domain and make then 'secure password' policy compliance.
Current thread:
- ENC: Password Pride - A Humorous Vulnerability Marcus Valsecchi (Jan 19)
- RE: Password Pride - A Humorous Vulnerability Dixon, Wayne (Jan 22)
- Re: Password Pride - A Humorous Vulnerability Melissa (Jan 22)
- RE: Password Pride - A Humorous Vulnerability David Gillett (Jan 23)
- Re: Password Pride - A Humorous Vulnerability RS (Jan 22)
- RE: Password Pride - A Humorous Vulnerability Murda Mcloud (Jan 23)
- Message not available
- Highlighting weak password dangers WALI (Jan 24)
- RE: Highlighting weak password dangers Simon W. Hall (Jan 25)
- RE: Highlighting weak password dangers Scott Ramsdell (Jan 26)
- Re: Highlighting weak password dangers Manuel Arostegui Ramirez (Jan 26)
- Re: Highlighting weak password dangers Alexander Bolante (Jan 30)
- Re: Highlighting weak password dangers anesde (Jan 31)
- Re: Password Pride - A Humorous Vulnerability Melissa (Jan 22)
- RE: Password Pride - A Humorous Vulnerability Dixon, Wayne (Jan 22)
- Message not available
- Re: Port 8081 mystery WALI (Jan 24)
- Port 8081 mystery WALI (Jan 23)
- RE: Port 8081 mystery Gressick, Michael (Jan 24)
- Re: Port 8081 mystery Brian . D . Turk (Jan 24)
- RE: Port 8081 mystery Remad (Jan 24)