Web Wiz - Green Windows Web Hosting - Celebrating 25 Years!

  New Posts New Posts RSS Feed - Login system bruteforce attacks
  FAQ FAQ  Forum Search   Events   Register Register  Login Login

Login system bruteforce attacks

 Post Reply Post Reply
Author
netsonic View Drop Down
Newbie
Newbie


Joined: 30 January 2004
Status: Offline
Points: 27
Post Options Post Options   Thanks (0) Thanks(0)   Quote netsonic Quote  Post ReplyReply Direct Link To This Post Topic: Login system bruteforce attacks
    Posted: 28 July 2005 at 9:09am
i want to ask about security system of webwiz...

if someone makes a bruteforce attack to login panel is there any preventive measure of the webwiz script?

r this types of attacks make server busy ? and can make any script overloading and give errors?

is some type of session blocking necessarry for this?

i am asking coz i want to learn and use it on my own scripts...


thanks a lot
Back to Top
WebWiz-Bruce View Drop Down
Admin Group
Admin Group
Avatar
Web Wiz Developer

Joined: 03 September 2001
Location: Bournemouth
Status: Offline
Points: 9844
Post Options Post Options   Thanks (0) Thanks(0)   Quote WebWiz-Bruce Quote  Post ReplyReply Direct Link To This Post Posted: 28 July 2005 at 12:13pm
You can edit the common.asp file and change the following to true:-

blnLongSecurityCode = false

It will enabled security images that require the user to type in a unique security code on the login page.

This should prevent brute force attacks.
Back to Top
JJLatWebWiz View Drop Down
Groupie
Groupie
Avatar

Joined: 02 March 2005
Location: United States
Status: Offline
Points: 136
Post Options Post Options   Thanks (0) Thanks(0)   Quote JJLatWebWiz Quote  Post ReplyReply Direct Link To This Post Posted: 28 July 2005 at 1:06pm
boRg, how realistic is a brute force attack against the WWF password?
 
A brute force attack first assumes that the enryption is free of backdoors and defects.  And the salt makes a dictionary attack against the hash impractical.  So, given the first assumption, a brute force attack would require the attacker to test as many as 1,461,501,637,330,900,000,000,000,000,000,000,000,000,000,000,000 different passwords.  In reality, educated guesses would probably reduce that number to a couple million at most.  Given the latency and response time of the internet and the web server being attacked, if each attempt takes .5 seconds and we assume the attacker gives up or succeeds after a million tries, the attack is going to take over 138 hours of continuous activity.  And since the failure response page is about 7500 bytes (not including protocol and network overhead), that results in about 7GB of data being sent to that single user in the 138 hour time frame.  Not to mention the million server log entries.
 
Of course if someone tries to guess the password using a dictionary attack with a million entries, it's not technically "brute force".  But, as boRg suggests, requiring the security code makes a dictionary attack as impractical as a brute force attack and should satisfy most administrators.  I don't know what kind of protection other forum applications offer, but I might try to build options myself for "minimum time between retries", "auto lock out with auto unlock or manual unlock", and failure logging.  Maybe simply linking the login function to the anti-spam function would solve it rather nicely.
 
 
Back to Top
JCH2 View Drop Down
Groupie
Groupie


Joined: 04 February 2005
Status: Offline
Points: 129
Post Options Post Options   Thanks (0) Thanks(0)   Quote JCH2 Quote  Post ReplyReply Direct Link To This Post Posted: 28 July 2005 at 3:15pm
Except that this approach is cumbersome to users.  Add an extra field to the login form called "count".  Upon each failed login, the count is increased by one and passed to the next instance of the form. If the count goes about 3, the person trying to login gets spilled back to the default page, thereby the claymore or other brute force module can't be scripted easily to respond to failed login attempts.  Simple and convenient.
Back to Top
redsnapper View Drop Down
Newbie
Newbie


Joined: 20 July 2005
Status: Offline
Points: 10
Post Options Post Options   Thanks (0) Thanks(0)   Quote redsnapper Quote  Post ReplyReply Direct Link To This Post Posted: 29 July 2005 at 5:30am
blnLongSecurityCode = false



I'm tryiing to get rid if the need for the security code images on my forum but even if i set that variable to false i still get the security image check on the registration page


Is there another variablee or file that needs to be amended as well?
Back to Top
WebWiz-Bruce View Drop Down
Admin Group
Admin Group
Avatar
Web Wiz Developer

Joined: 03 September 2001
Location: Bournemouth
Status: Offline
Points: 9844
Post Options Post Options   Thanks (0) Thanks(0)   Quote WebWiz-Bruce Quote  Post ReplyReply Direct Link To This Post Posted: 29 July 2005 at 6:49am
The security images from the registration page can not be removed.
Back to Top
 Post Reply Post Reply

Forum Jump Forum Permissions View Drop Down

Forum Software by Web Wiz Forums® version 12.08
Copyright ©2001-2026 Web Wiz Ltd.


Become a Fan on Facebook Follow us on X Connect with us on LinkedIn Web Wiz Blogs
About Web Wiz | Contact Web Wiz | Terms & Conditions | Cookies | Privacy Notice

Web Wiz is the trading name of Web Wiz Ltd. Company registration No. 05977755. Registered in England and Wales.
Registered office: Web Wiz Ltd, Unit 18, The Glenmore Centre, Fancy Road, Poole, Dorset, BH12 4FB, UK.

Prices exclude VAT at 20% unless otherwise stated. VAT No. GB988999105 - $, € prices shown as a guideline only.

Copyright ©2001-2026 Web Wiz Ltd. All rights reserved.