Blue Team Defense against Password Attacks
Protection against cracking relies on secure implementation and strong user policies.
Implementation Defense
- Salting: Ensure all passwords are cryptographically salted using a unique, random salt for every user.
- Key Stretching/Hardening: Use slow, resource-intensive hashing algorithms like Bcrypt or Argon2 instead of fast algorithms like MD5 or SHA-1. Slower algorithms increase the time (and cost) for an attacker to crack passwords, even with GPUs.
- Never Store in Plaintext: Always hash passwords before storing them.
Policy Defense
- Enforce Length: Prioritize password length (14+ characters) over excessive complexity requirements.
- MFA: Require Multi-Factor Authentication for all high-value accounts.
- Account Lockout: Implement policies to temporarily lock accounts after a small number of failed login attempts (e.g., 5 attempts in 5 minutes) to deter online brute-forcing.