For years we’ve been told that the best approach to staying secure is to have a good password. Conventional wisdom says that this should be at least nine characters long and use a combination of upper and lower case characters, numbers, and special characters.
But I ask you, is this secure?
P@55word1!
All joking aside, this is obviously not, so what is good password protocol?
In this blog, we’ll be delving a little deeper into password best practice to help you and your accounts stay that little bit safer and more secure online.
Criminals and hackers have all the tools they need
Let’s start though with the cyber criminals and hackers who want to access your data. And unsurprisingly, they have the tools and tricks of the trade to help them do just that.
These include lists of commonly used passwords, software that allows them to make common substitutions to words (like the P@55word example above) and tools that can try every possible combination of characters, as well as information from previous password breaches that may include usernames and password information that are still in use.
Common weaknesses in passwords
There are plenty of themes and weaknesses in passwords that are unfortunately still all too common. These include:
Complexity – when asked to add complexity when creating or updating a password, many people will still change the first character to upper case and add 1! to the end. Then every time they get asked to change their password, they just increase the number, often to the next consecutive digit.
Unfortunately, the tools attackers have make most types of commonly used complexity ineffective.
Seasonal passwords – we would wager that there are currently several hundred people using Autumn23! as their password. It ‘meets’ the complexity requirements but is still easy to remember. With everything from email to work accounts, online banking or shopping, we have an ever-growing number of passwords to remember, so it’s no surprise that constant requests to change passwords can lead to predictable words being used.
Password length – while it is rare that criminals will attempt every possible combination of characters in an effort to crack your password, it is possible. In this instance, the longer you can make a password, the more secure it will be.
Dictionary words and sequences – beware, using common dictionary words can lead to weak passwords, as attackers may take lists of every word in a language and run it through a tool to check if your password matches any of them. Similarly sequences such as 123456, or qwerty, are predictable and easily guessed.
Tips to protect your account
So now you know some of the most common pitfalls, what can you do to help protect your account?
Passphrases – using long passphrases allows you to create unpredictable sequences of words that are not just memorable, but also long, and you can add extra levels of complexity too if needs be.
P@ssw0rd! may not be secure, but Obscure-Sp3lunking*Gorilla definitely is (it is complex, long, unpredictable, and unlikely to be in any list of commonly used passwords).
Multi Factor Authentication (MFA) – Multi Factor Authentication, also known as MFA, adds anther level of security that can help keep your accounts secure, even if your password is compromised. Common forms of MFA involve using a one-time code, which might be accessed via an authenticator app or be sent as a text message, but other formats can involve facial or fingerprint recognition for example.
Password managers – we all have a multitude of passwords to create, update and remember – and password managers (sometimes called password lockers) can simplify the process of generating and storing complex passwords securely.
As long as the account for the password manager is sufficiently protected, this can be a great way to take away the strain of remembering strong passwords.
And finally, there is plenty of free helpful and useful password advice and guidance (plus much, much more) on the National Cyber Security Centre website, so take a look.
Setting up your own testing lab environment
A HOW TO GUIDE Introduction Welcome to your journey into building a lab environment with VirtualBox! Whether you are an aspiring penetration tester or just someone passionate about cybersecurity, having a safe and controlled environment to practice and experiment is...
How to Start Your Career In Penetration Testing
A HOW TO GUIDE If you want a career in penetration testing but don’t know where to start, this e-book will take you through what you need to know, with plenty of advice and tips throughout. Introduction Let's be honest. The cyber security industry is a mystery to most...
Crack more passwords with custom wordlists
Password cracking is an essential skill for penetration testers. Whether it is being used to crack a hash you’ve got from using responder, gain a first foothold on a device, or attempting to compromise accounts for lateral movement through a network, it is an...
What are JWT Tokens – and how to ‘hack’ them
JSON Web Tokens – or JWTs – are a common method of providing authentication and authorisation to a web application. While they may seem complex, it is possible to look closely and break down the structure of these three-part tokens, to understand the different...
Be part of our community by doing the following:
Copyright ©️ 2023 North Green Security LTD, All Rights Reserved | Privacy Policy | Terms and Conditions | Company Number 11968522