CCNA Security Exam Tutorial: When It’s Good To Add Salt

When you started studying for your CCNA certification exam, one of the very first things you learned was the major difference between the enable password and the enable secret – the enable secret is encrypted by default, where the enable password is just sitting there in clear text, waiting to be read!
When you look at the enable secret in a Cisco router configuration, it looks like it would be impossible to guess. [url=http://www.testpassport.net/CCNA/640-802.asp]640-802[/url]:Cisco Certified Network Associate(CCNA) After setting the enable secret on this router to the word security, here’s how it appears in the configuration:enable secret 5 $1$24me$gVFxUOI4gYp0IQbhtH8Rz0
That password has been encrypted by MD5, the Message Digest 5 algorithm. The result of the MD5 algorithm being applied to the password is a 32-character hexadecimal value.
That password is hard to guess, but not terribly hard to crack. Anyone looking over your shoulder would not be able to come up with that password, but there are readily-available password cracking software devices that can crack that encryption in a matter of minutes. That’s true of any MD5-encrypted password, not just those on Cisco routers.So what can we do about this? We can add SALT to our MD5.
The salt itself is simply a string of random characters that are added to the encryption process. Salting makes it much more difficult for a hacker to come up with the password; each bit added by the salt process literally makes it twice as difficult for the password to be compromised. A recent Wikipedia entry states that if a password was one of 200,000 words, a 32-bit salt would require 800 trillion hashes for a full-blown brute force attack.
The actual creation and application of a salt is beyond the scope of the CCNA Security exam, but once you’ve earned that valuable certification – or maybe while you’re preparing for it – do a Google search on “salt md5” and read up on this powerful security tool. In the meantime, look for more CCNA Security tutorials on the site you’re on now as well as my website!
Chris Bryant, CCIE #12933, is the owner of The Bryant Advantage, home of over 100 free certification exam tutorials, including Cisco CCNA certification test prep articles. His exclusive Cisco CCNA study guide and Cisco CCNA training is also available! Visit his blog and sign up for Cisco Certification Central, a daily newsletter packed with CCNA, Network+, Security+, A+, and CCNP certification exam practice questions! A free 7-part course, “How To Pass The CCNA”, is also available, and you can attend an in-person or online CCNA boot camp with The Bryant Advantage!

http://www.killtest.net/CCNA/640-802.asp

The salt itself is simply a string of random characters that are added to the encryption process. Salting makes it much more difficult for a hacker to come up with the password; each bit added by the salt process literally makes it twice as difficult for the password to be compromised. A recent Wikipedia entry states that if a password was one of 200,000 words, a 32-bit salt would require 800 trillion hashes for a full-blown brute force attack.

TOP

Quest for CCNA

At the moment I’m looking at some resources from Cisco Networking for Home and Small Business, CCNA Discovery Learning Guide, but the thing is that what I really want is a classroom based training with a proper CCNA certification so I can enhance networking capabilities in the real world. MY controversy however is that different people and organisations tend to use different vibes in the way to go about this. For example, Firebrand Training, who I recently learnt about are advising me I can get certified in 5 days, I mean what do I make of that. Just go with it or shall I consider further options. What I would really like is that if someone has trained with these guys to get to me and drop a reply or something because I really need to get this done asap.

Thank you for your consideration.

TOP

CISCO IOS

Looking for the download

TOP

返回顶部
CopyRight © 2009 CCNA Live

Powered by Discuz! 7.2 © 2008 Comsenz Inc.

Contact Us - Clear Cookies - Stats - Archiver - WAP

GMT+8, 2018-1-19 09:12.