Cracking Password Management Protocols

Cracking Password Management Protocols

It has been a heated topic of debate when it comes on to Apple Products, “Do Macs get viruses? Do Macs need an antivirus? Why you DO need security software for your Mac”. Usually, mac users would state NO in all caps, but the truth is, all software is prone to hacks and viruses. What’s more interesting is that Apple will offer upwards of USD$200,000 for reports of security flaws that can be validated. In a post my Haslam(2016), she stated that “The Mac is generally considered to be safe and secure, and there are a number of reasons why Macs are considered more secure than PCs”

Mac operating system is Unix-based, which offers a number of security features built-in.

Mac’s Password Management System

The name of the native password management system used by Mac is “Keychain”. This system can store all your passwords for applications, namely: 

  • Servers
  • Websites
  • System Applications
  • Credit Cards
  • Personal identification numbers (PINs) for bank accounts.

Just to name a few.

Installing applications to crack a native software does not sound safe, nor do I think is it recommended; however, I can only hope for the best and follow through and use a Virtual Machine by way of Parallels Desktop.

I will be attempting to crack this management system using Elcomsoft Password Digger.

Elcomsoft Password Digger is a Windows tool for decrypting the content of system and user keychains pulled from a Mac OS computer. The tool exports the full data set into an XML file or builds a filtered dictionary for using with password recovery tools. The system and all user keychains can be decrypted.

First Finding the KeyChain Files

Figure 1.0 Mac’s Keychain location

Screen Shot 2016-08-24 at 9.06.11 PM.png

However this has proven to be unbreakable, the encrypted password for the file can’t be broken with any known attack software, thus I decided to take another approach; one that would require changing the user’s password via recovery mode. Macs have no very shocking weakness and that’s it recovery mode. The following can be achieved by someone not knowing your password but access to the recovery mode settings.

Figure 1.1 Illustrates recovery mode default options 

20160824_223847.jpg

How to enter recovery mode.

  1. Boot the computer in the recovery mode using Command-R whilst booting
  2. Choose Utilities > Terminal
  3. Type resetpassword
  4. Press Enter
  5. The Reset Password Utility window will open
  6. Select the user profile 
  7. Enter new password
  8. Confirm new password
  9. Press Save
  10. Done
  11. Reboot Computer and login with a new password

Following these steps allow you to do both these things, log in as root and configure a new account(Figure 1.2 –  1.3) or log in with an existing username(Figure 1.4). Has discussed earlier the Keychain will be your only issue as resetting the password of the user does not affect or reset the Keychain’s password.

Figure 1.2 root access option

LWScreenShot 2016-08-24 at 10.39.34 PM.png

Figure 1.3 Illustrates a new account set up via root

LWScreenShot 2016-08-24 at 10.09.43 PM.png

Figure 1.4 Illustrates Keychain authentication for the old user and old password

Screen Shot 2016-08-24 at 10.06.56 PM.png

In conclusion, I am genuinely shocked and I am set up a firmware password immediately. By setup same Mac prompts for a password whenever the system is being started up from another drive, or from OS X Recovery, rather than allowing access by default.

Reference

Haslam, K. (2016) Do Macs get viruses?, Available at: http://www.macworld.co.uk/how-to/mac-software/are-macs-safe-virus-hackers-malware-antivirus-ransomware-bounty-3454926/ (Accessed: Aug 23, 2016).

Leave a Reply

Your email address will not be published. Required fields are marked *

Groope Multimedia © 2019, All rights reserved