• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Password Salting to Increase Windows Active Directory Security

Sponsored by Specops Software by Sponsored by Specops Software
November 30, 2022
Reading Time: 4 mins read
0
Password Salting to Increase Windows Active Directory Security

Salting a password

RELATED POSTS

CISA warns govt agencies of recently patched Barracuda zero-day

QBot malware abuses Windows WordPad EXE to infect devices

Hot Pixels attack checks CPU temp, power changes to steal data

Password salting is a technique for making passwords more difficult to crack by adding random values to the stored password hash.

In order to understand password salting and its benefits however, it is necessary to understand how Windows stores passwords and some of the risks that are associated with storing passwords in that way.

Password Hashing and where it falls short on security

When you create a user account within Windows, the operating system does not actually store the account’s password. Otherwise, it would be too easy for malicious software, cybercriminals, or even rogue administrators to simply look up user’s passwords.

Instead, passwords are hashed prior to being stored. In other words, a mathematical formula is used to turn passwords into hexadecimal strings. It is those strings, or hashes, that are stored rather than the password itself.

When a user attempts to log into a system they are prompted for a username and password. When the user types their password, the password that they have entered is hashed by using the same formula that was used to create the stored password hash.

At that point, the hash of the password that the user has just entered is compared against the stored password hash. If the two hashes are identical, then the user has entered the correct password and is therefore allowed to log into the system.

Buy JNews
ADVERTISEMENT

Password hashing work flow

The problem with password hashes is that they can make it easier for an attacker to figure out a user’s password. Lengthy passwords can make brute force password cracking impractical or impossible. However, an attacker can use a password hash as is, skipping the brute force cracking altogether.

The reason why this is possible is because Windows does not use a unique hashing algorithm on each system.

Suppose for a moment that you created an account and then you looked up the hash for that account’s password. If you were to then create a different account on a completely different system, but used the same password as before, then the two accounts would have identical password hashes.

Cyber criminals know this and have created massive databases of passwords and their corresponding hashes. This means that if an attacker wants to crack an account’s password they need only to check to see if the password’s hash is listed in their password database.

If the hash is present in the database, then they can use a simple table lookup to find the password that corresponds to the hash, without the hassles of a brute force crack.

Increasing the security of your AD stored passwords

This is where password salting comes into play. A salt is a value that is added to the user’s password. This happens behind the scenes without the user’s knowledge.

The addition of a salt causes the password’s hash to change, making it far more difficult to use a table lookup as a way of cracking the password.

When properly implemented, salts are random, with a different salt being used for each user. This means that even if two users in your organization have identical passwords their password hashes will differ from one another because a different salt was used for each.

Drawbacks of password salting

Using password salts can be a highly effective way to protect user accounts in your organization. Even so, password salting does have at least a few disadvantages.

  1. Password salting isn’t quick

First, the salting process is computationally intensive. As such, salting may slow down the user authentication process, particularly in situations where domain controllers are under provisioned or large numbers of users are attempting to log on at the same time.

  1. Password salting isn’t a beginner-level protocol

Another disadvantage to password salting is that it can be difficult to implement. The Windows operating system does not natively include a salting mechanism. According to Microsoft, “Neither the NT hash nor the LM hash is salted”. As such, salting will require the use of third-party software.

Secure alternatives to password salting

Of course, it is possible to keep your organization’s passwords secure without having to resort to using password salting. Specops Password Policy for example, contains tools to prevent users from using weak passwords.

This not only means enforcing password complexity requirements (even beyond what is possible using Windows alone), but also preventing users from choosing passwords that are susceptible to dictionary attacks that password salting would ordinarily prevent.

More importantly, Specops maintains a database consisting of over 3 billion passwords that are known to have been compromised.

Specops Password Policy actively compares user’s passwords to this database to see if the user is using a compromised password, and then forces a password change if necessary. You can test out Specops Password Policy in your Active Directory with a free trial, anytime.

Remember, table-based lookup attacks are only effective if the user’s password hash is listed in the table. Specops Password Policy can help to prevent users from using any passwords that are known to be vulnerable to these types of attacks.

The result is a level of protection that is comparable to that of password salting, but without the hassles of managing salts.

Sponsored and written by Specops Software

Share54Tweet34Pin12
Sponsored by Specops Software

Sponsored by Specops Software

Related Posts

CISA orders govt agencies to update iPhones, Macs by May 1st
Cyber Security

CISA warns govt agencies of recently patched Barracuda zero-day

May 27, 2023
New QakNote attacks push QBot malware via Microsoft OneNote files
Cyber Security

QBot malware abuses Windows WordPad EXE to infect devices

May 27, 2023
Hot Pixels attack checks CPU temp, power changes to steal data
Cyber Security

Hot Pixels attack checks CPU temp, power changes to steal data

May 27, 2023
Time to challenge yourself in the 2023 Google CTF!
Cyber Security

Time to challenge yourself in the 2023 Google CTF!

May 26, 2023
Time to challenge yourself in the 2023 Google CTF!
Cyber Security

Time to challenge yourself in the 2023 Google CTF!

May 26, 2023
The Week in Ransomware – December 16th 2022 – Losing Trust
Cyber Security

The Week in Ransomware – May 26th 2023 – Cities Under Attack

May 26, 2023

Recommended Stories

As Bitcoin revisits $26,000, here are the possibilities…

As Bitcoin revisits $26,000, here are the possibilities…

May 19, 2023
I asked ChatGPT Shiba Inu’s price prediction and the answer was…

I asked ChatGPT about a possible SHIB rally, the answer was pretty intriguing

May 14, 2023
OKX burns massive amount of OKB, but these concerns still remain

OKX burns massive amount of OKB, but these concerns still remain

March 25, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • XRP settlement: A turning point in US crypto regulations?
  • Uniswap spikes despite StarkNet; Avalanche in pursuit?
  • Avorak AI: A leading force in the crypto space

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?