Naziv
|
Try Common or Default Usernames and Passwords
|
Sažetak
|
An adversary may try certain common or default usernames and passwords to gain access into the system and perform unauthorized actions. An adversary may try an intelligent brute force using empty passwords, known vendor default credentials, as well as a dictionary of common usernames and passwords. Many vendor products come preconfigured with default (and thus well-known) usernames and passwords that should be deleted prior to usage in a production environment. It is a common mistake to forget to remove these default login credentials. Another problem is that users would pick very simple (common) passwords (e.g. "secret" or "password") that make it easier for the attacker to gain access to the system compared to using a brute force attack or even a dictionary attack using a full dictionary.
|
Preduvjeti
|
The system uses one factor password based authentication.The adversary has the means to interact with the system.
|
Rješenja
|
['Delete all default account credentials that may be put in by the product vendor.', 'Implement a password throttling mechanism. This mechanism should take into account both the IP address and the log in name of the user.', 'Put together a strong password policy and make sure that all user created passwords comply with it. Alternatively automatically generate strong passwords for users.', 'Passwords need to be recycled to prevent aging, that is every once in a while a new password must be chosen.']
|