The National Institute of Standards and Technology (NIST) issued an update to its password guidelines in June 2017 titled Digital Identity Guidelines (SP 800-63-3). Many of the guidelines that previously existed in the industry as best practice with credentials have been replaced with simpler, more user-friendly approaches.
Examples of new guidelines in the Digital Identity Guidelines (SP 800-63-3):
- Length of passwords between 8 – 64 characters are recommended.
- Character types of nonstandard characters, such as emoticons, are allowed when possible.
- Long passphrases are encouraged and should not match entries in the prohibited password dictionary
- Password reset frequency should be primarily triggered on if the password is compromised or forgotten
- Multifactor Authentication is encouraged in all but the least sensitive applications
Related Links and Additional Reading:
- NIST’s New Password Rule Book: Updated Guidelines Offer Benefits and Risk
The Chromensics tool is developed to read all information from chrome browser directory and present it to user, in easy readable tabular format which can be explored in descent interface without running the chrome browser. The tool will also allow you retrieve information from other chrome installation brought from different machine for analyzing. The acquired artifacts can be exported in PDF report to present it in court of law or to superiors.
An interesting approach to a Man-in-the-Middle Attack against a Password Reset System
The PRMitM attack exploits the similarity of the registration and password reset processes to launch a man in the middle (MitM) attack at the application level. The attacker initiates a password reset process with a website and forwards every challenge to the victim who either wishes to register in the attacking site or to access a particular resource on it.
Source: The Password Reset MitM Attack
Common Sense Graphite is a site by teachers, for teachers that helps you find the best educational technology resources and learn the best practices for implementing them in your classroom. Brought to you by Common Sense Media: Empowering kids to thrive in a world of media and technology.
Source: Information Security Primer for Evaluating Educational Software
Use Shodan to discover which of your devices are connected to the Internet, where they are located and who is using them.
Listed below are some popular search shortcuts/search keywords to help with narrowing your search results:
||Any Numeric Value
||SSL Certificates for Organizatio
||SSL Version Value
|Example Search Query
||Finding HP LaserJet printers on the network
||Finding devices with SSL certificates issued by eDellRoot
||Find hosts supporting SSLv2 in the 18.104.22.168/16 subnet