Category: Security

Security content from Leo Nelson

New NIST Password Guidelines

The National Institute of Standards and Technology (NIST) issued an update to its password guidelines in June 2017 titled Digital Identity Guidelines (SP 800-63-3). Many of the guidelines that previously existed in the industry as best practice with credentials have been replaced with simpler, more user-friendly approaches.

Examples of new guidelines in the Digital Identity Guidelines (SP 800-63-3):

  • Length of passwords between 8 – 64 characters are recommended.
  • Character types of nonstandard characters, such as emoticons, are allowed when possible.
  • Long passphrases are encouraged and should not match entries in the prohibited password dictionary
  • Password reset frequency should be primarily triggered on if the password is compromised or forgotten
  • Multifactor Authentication is encouraged in all but the least sensitive applications

Related Links and Additional Reading:

  1. NIST’s New Password Rule Book: Updated Guidelines Offer Benefits and Risk

Google Chrome Forensics

The Chromensics tool is developed to read all information from chrome browser directory and present it to user, in easy readable tabular format which can be explored in descent interface without running the chrome browser. The tool will also allow you retrieve information from other chrome installation brought from different machine for analyzing. The acquired artifacts can be exported in PDF report to present it in court of law or to superiors.

The Password Reset MitM Attack

An interesting approach to a Man-in-the-Middle Attack against a Password Reset System

The PRMitM attack exploits the similarity of the registration and password reset processes to launch a man in the middle (MitM) attack at the application level. The attacker initiates a password reset process with a website and forwards every challenge to the victim who either wishes to register in the attacking site or to access a particular resource on it.

Source: The Password Reset MitM Attack

Shodan Search Shortcuts

Use Shodan to discover which of your devices are connected to the Internet, where they are located and who is using them.

Listed below are some popular search shortcuts/search keywords to help with narrowing your search results:

Keyword Values Description Example
port Any Numeric Value Specific Ports port:554
has_screenshot True/False Has Screenshot has_screenshot:true
org Organization Value Organization org:”Microsoft”
ssl Organization Value SSL Certificates for Organizatio ssl:edellroot
ssl:Some University
ssl.version SSL Version Value SSL Version ssl.version:sslv2
net IP Range IP Range net:

Search Examples

Example Search Query Used For
port:9100 product:”LaserJet” Finding HP LaserJet printers on the network
ssl:edellroot Finding devices with SSL certificates issued by eDellRoot
net: ssl.version:sslv2 Find hosts supporting SSLv2 in the subnet