Identity and Account Management — Ethical Hacking 101

Bhavyansh @ DiversePixel
4 min readMay 8, 2024

--

Let’s start with,

The Pillars of Authentication

Authentication verifies a user’s identity before granting access to systems or resources. It involves three key steps:

  1. Identification: The user claims their identity, usually through a username or other unique identifier.
  2. Authentication: The user provides evidence to support their identity claim, typically a password, but other methods like biometrics or tokens can also be used.
  3. Authorization: Once authenticated, the system determines what actions the user is permitted to perform based on their assigned permissions.
Photo by Taras Shypka on Unsplash

Adding Layers of Security with Multi-Factor Authentication (MFA)

MFA enhances security by requiring multiple factors for authentication, making it significantly harder for attackers to gain unauthorized access. These factors fall into categories like:

  • Something you know: Passwords, PINs, or security questions.
  • Something you have: Smart cards, security tokens, or mobile devices with authentication apps.
  • Something you are: Biometric factors like fingerprints, facial recognition, or iris scans.
  • Additional Attributes: Other factors can include behavioral biometrics (typing speed), location information, or trusted devices.

Beyond Authentication: Accounting and Auditing

Auditing plays a vital role in tracking user activity and identifying potential security incidents. It involves recording user actions and system events to provide an audit trail for forensic analysis and accountability. Tools like Event Viewer in Windows allow administrators to monitor system logs and detect suspicious activities.

Password Management: Striking a Balance Between Security and Convenience

Managing numerous passwords securely can be challenging. Password vaults like LastPass offer a solution by storing and managing passwords in an encrypted format, accessible with a master password. However, it’s crucial to choose a reliable password manager and ensure the master password remains secure.

Exploring Authentication Methods

Various authentication methods cater to different needs and security levels:

  • Passwords: The most common method, but vulnerable to weak passwords and cracking attempts.
  • One-Time Passwords (OTPs): Provide an extra layer of security with time-sensitive codes generated by tokens or mobile apps.
  • PKI Certificates: Issued by trusted authorities, they provide strong authentication for users and devices.
  • Smart Cards: Physical tokens containing embedded chips for secure authentication.
  • SSH Keys: Used for secure remote access to servers, employing public-key cryptography.
  • Biometrics: Offer convenient and secure authentication using unique biological characteristics. However, they have limitations like false acceptance/rejection rates and privacy concerns.

Credential Policies: Defining Access Rules

Credential policies establish rules and guidelines for managing user accounts and access privileges. These policies address aspects like password complexity, account lockout durations, and privilege levels for different user types (employees, contractors, administrators).

Access Control Models: Determining Who Gets What

Different access control models define how permissions are assigned and managed:

  • Attribute-Based Access Control (ABAC): Grants access based on user attributes like job role, department, or location.
  • Role-Based Access Control (RBAC): Assigns permissions based on predefined roles within the organization.
  • Rule-Based Access Control (RBAC): Uses rules and conditions to determine access, allowing for more granular control.
  • Mandatory Access Control (MAC): Implements strict access control policies enforced by the operating system, often used in high-security environments.
  • Discretionary Access Control (DAC): Grants access based on the owner’s discretion, typically used for personal files and resources.

Physical Access Control: Securing the Physical Realm

Physical access control measures like locks, security guards, and surveillance systems are essential for protecting physical assets and preventing unauthorized entry to sensitive areas.

Account Management Best Practices

Effective account management practices ensure secure and efficient access control:

  • Principle of Least Privilege: Grant users the minimum level of access required to perform their duties.
  • Group-Based Permissions: Simplify permission management by assigning permissions to groups instead of individual users.
  • Account Auditing: Regularly review and monitor user accounts to identify and address potential security risks.
  • Disable Unused Accounts: Deactivate or remove accounts that are no longer needed to minimize potential attack vectors.

Network Authentication Protocols

Various protocols secure network access and communication:

  • Password Authentication Protocol (PAP): A simple but insecure method that transmits passwords in plaintext.
  • MS-CHAPv2: A more secure protocol used in Microsoft environments that transmits password hashes instead of plaintext.
  • NTLM: Another Microsoft protocol, with NTLMv2 offering improved security over the older version.
  • Kerberos: A widely used protocol in Active Directory environments, employing tickets for secure authentication.
  • EAP (Extensible Authentication Protocol): A flexible framework supporting various authentication methods, often used in wireless networks.
  • IEEE 802.1x: A standard for port-based network access control, often used with EAP for authentication.
  • RADIUS: A centralized authentication protocol used for remote access and network services.

Identity Management Systems and Single Sign-On (SSO)

Identity management systems streamline user provisioning and access control. SSO solutions like OpenID and OAuth allow users to access multiple applications with a single set of credentials, improving convenience and security.

Identity Federation and SAML

Identity federation allows multiple organizations to trust a single identity provider (IdP) for authentication. SAML (Security Assertion Markup Language) is a standard used for exchanging authentication information between IdPs and service providers.

Securing Remote Access and Public Wi-Fi

Remote access solutions like VPNs provide secure connections for remote users. Captive portals enhance security on public Wi-Fi hotspots by requiring users to authenticate before accessing the network.

The Importance of Forensic Analysis

Logging and monitoring user activity provides valuable data for forensic analysis, allowing investigators to reconstruct events and identify the source of security incidents. Abnormal login patterns, impossible travel times, and risky login attempts can indicate potential security breaches.

--

--

Bhavyansh @ DiversePixel
Bhavyansh @ DiversePixel

Written by Bhavyansh @ DiversePixel

Hey I write about Tech. Join me as I share my tech learnings and insights. 🚀

No responses yet