Posts

Showing posts with the label DUHK Attack

Password spraying attack

Image
      A password spraying attack is a type of brute-force attack where an attacker tries a single password against multiple usernames. The goal of a password spraying attack is to gain access to a target's account by guessing the correct password. Unlike traditional brute-force attacks that try multiple passwords against a single username, password spraying attacks try a single password against multiple usernames. Password spraying attacks are effective because many users tend to use weak passwords or reuse the same password across multiple accounts. Attackers can use tools to automate the process of trying a single password against multiple usernames, making it a relatively easy and low-risk attack to carry out. To execute a password spraying attack, an attacker first gathers a list of usernames, typically by scanning social media profiles, company directories, or other public sources. Once the attacker has a list of usernames, they will use a tool to automate the process of tryin

DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions

Image
DUHK — Don't Use Hard-coded Keys — is a new 'non-trivial' cryptographic implementation vulnerability that could allow attackers to recover encryption keys that secure VPN connections and web browsing sessions. DUHK is the third crypto-related vulnerability reported this month after KRACK Wi-Fi attack and ROCA factorization attack. The vulnerability affects products from dozens of vendors, including Fortinet, Cisco, TechGuard, whose devices rely on ANSI X9.31 RNG — an outdated pseudorandom number generation algorithm — 'in conjunction with a hard-coded seed key.' Before getting removed from the list of FIPS-approved pseudorandom number generation algorithms in January 2016, ANSI X9.31 RNG was included into various cryptographic standards over the last three decades. Pseudorandom number generators (PRNGs) don’t generate random numbers at all. Instead, it is a deterministic algorithm that produces a sequence of bits based on initial secret values called a seed and t