CertCities.com -- The Ultimate Site for Certified IT Professionals
Post Your Mind in the CertCities.com Forums Share share | bookmark | e-mail
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New on
Redmondmag.com!

Cover Story: IE8: Behind the 8 Ball

Tech-Ed: Let's (Third) Party!

A Secure Leap into the Cloud

Windows Mobile's New Moves

SQL Speed Secrets


CertCities.com
Let us know what you
think! E-mail us at:



 
 
...Home ... Editorial ... Columns ..Column Story Monday: December 19, 2011


 Windows Security Center  
Derek Melber
Derek Melber


 Stand Up to Rainbow Tables
Derek offers some simple tips to make your passwords more secure.
by Derek Melber  
6/15/2005 -- Everyone knows that keeping user passwords secure is crucial to a secure network. For years you’ve been required to implement passwords that are long and complex enough to beat password crack tools. With the advent of Rainbow Tables, the requirements to make passwords longer and more complex have increased. In this article I'll discuss some methods you can implement to make your passwords more secure against Rainbow Tables.

What Is a Rainbow Table?
Rainbow Tables are pre-generated hash tables that include the hash results of all the different combinations of password characters and lengths possible. The tables bypass the concept of brute-force attacks which are used by older crack tools such as L0phtcrack. Rainbow Tables can determine passwords up to 12 times faster than other crack tools, as they only require that a comparison be made, unlike a brute-force attack. (You can read more about Rainbow Tables here).

Defending with Windows Settings
A default user password in a Windows Server 2003 Active Directory domain has the following requirements:

  • At least seven characters long
  • Must contain three of the four different types of characters (upper case, lower case, numeric, special)
  • Can’t include the username
  • Can’t include the logon name

To defend against Rainbow Tables, you need to increase the password length to the maximum length possible, yet short enough for users to memorize. Keep in mind that a seven-character password is not that difficult to crack using Rainbow Tables. Therefore, you should keep your minimum password length between 12 to 20 characters. We’ll talk about how users will work with these longer passwords in just a minute.

Your domain controllers will enforce these password restrictions for all domain user accounts. Unfortunately, domain controllers do two things that make even strong and complex passwords vulnerable. To protect against domain controllers performing these two fatal mistakes, you’ll want to configure the following two Group Policy Object (GPO) settings, which are both located at the following node in a GPO:

  Computer Configuration | Windows Settings | Security Settings | Local Policies | Security Options

  • Network Security: LAN Manager authentication level - This setting by default forces the domain controller to also send the LM password hash to the client when a user authenticates. This password is extremely weak and can be cracked with L0phtcrack very quickly, even without Rainbow Tables. This setting should be set to not send LM responses and to refuse any LM authentication requests.
  • Network Security: Do not store LAN Manager hash value on next password change - This setting by default forces the domain controllers to store the LM password hash, even if the client that authenticated the user is using a more secure authentication protocol such as NTLMv2 or Kerberos. To prohibit the domain controllers from storing the weak LM password hash, configure this policy as Enabled.

Helping Users with Longer Passwords
Instead of thinking of long passwords, such as "Ty6$nM#4s," consider using passphrases. A passphrase looks something like:

  Boston Red Sox in 2004

or:

  I live in AZ where the average temperature is 105 degrees

Notice that this is much easier to remember than the password that was just referenced. Also, this passphrase meets all the requirements for length and complexity. Users will be able to remember their passphrases much easier than shorter passwords that are simple words with no contextual meaning. With longer passphrases, Rainbow Tables don’t have much of a chance in getting to us.

Goodbye Rainy Days
Rainbox Tables are a great idea and effective against most user passwords; but as the passwords increase in length so do the table sizes, making the tool more and more ineffective. With Windows settings that can prohibit the use of weak LM password hashes along with increased password lengths, Rainbow Tables lose their ability to break our passwords. (If you need more assistance with getting passphrases to work with your system, go here.)


Derek Melber manages AuditingWindows.com, the first dedicated Web site for Windows auditing and security. Online training related to Derek's latest book series, "Auditing Windows Security," is available at AuditLearning.org. Derek also provides customized training. Contact Derek at .

 


More articles by Derek Melber:

-- advertisement --


There are 3 CertCities.com user Comments for “Stand Up to Rainbow Tables”
Page 1 of 1
8/28/05: Anonymous says: Don't listen to him, he's crazy! I saw him eat a baby once.
9/6/05: Ramius Kahn from USA says: Well, the primary weakness is in the LM Hash. If you are already used to typing in an 8 character password, simply enter it in twice. Passwords in excess of 14 characters will not use the weaker hash type and you have easily and effectivly negated the use of nearly all of the rainbowtables that are currently available on the internet. KIS - Keep it simple. Hope that this was helpful, Ramius Kahn Rainbowtables.net
8/17/06: Piotr Czecs says: Some password cracker like Ophcrack (http://ophcrack.sourceforge.net) are also able to break NThash that is supposed to be stronger than LM Hash. The problem with Microsoft passwords is that they don't use salt and so they will always be vulnerable to Rainbow Tables attack.
Your comment about: “Stand Up to Rainbow Tables”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

-- advertisement (story continued below) --

top