NEW: Microsoft Vulnerabilities Report 2022 - Read the Findings of Our Annual Report Read Now

  • Partners
  • Support
  • Careers
  • English
    • Deutsch
    • français
    • español
    • 한국어
    • português
BeyondTrust
  • Products

    Privileged Password Management

    Discover, manage, audit, and monitor privileged accounts and credentials.

    • Password Safe
    • DevOps Secrets Safe
    • Privileged Access Discovery Application

    Endpoint Privilege Management

    Enforce least privilege across Windows, Mac, Linux, and Unix endpoints.

    • Windows and Mac
    • Unix and Linux
    • Active Directory Bridge

    Secure Remote Access

    Centrally manage remote access for service desks, vendors, and operators.

    • Remote Support
    • Privileged Remote Access
    • Privileged Access Discovery Application

    Cloud Security Management

    Automate the management of identities and assets across your multicloud footprint.

    • Cloud Privilege Broker

    BeyondInsight

    Experience the industry’s most innovative, comprehensive platform for privileged access management.

  • Solutions

    Use Cases

    • Cloud Security
    • Compliance
    • Cyber Insurance
    • Digital Transformation
    • Endpoint Security
    • Operational Technology
    • Ransomware
    • Service Desk Efficiency
    • Zero Trust

    Industry Applications

    • Financial Services
    • Government Agencies
    • Healthcare
    • Law Enforcement
    • Manufacturing
    • Schools & Universities

    Solutions

    The BeyondTrust Privileged Access Management portfolio is an integrated solution that provides visibility and control over all privileged accounts and users.

  • Resources

    Learn

    • Blog
    • Customer Stories
    • Competitor Comparisons
    • Datasheets
    • Demos
    • Glossary
    • Podcast
    • Whitepapers

    Attend

    • Events
    • Go Beyond
    • Training
    • Webinars

    Support

    • Changelog
    • Professional Services
    • Technical Documentation

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

  • Company
    • About
    • Leadership
    • Core Values
    • Partners
    • Careers
  • Watch Demo
  • Contact Sales

The Great Password Reset: Not Dead, Expiring, or Forgotten—Just Change

September 16, 2020

  • Blog
  • Archive

Bill Gates famously predicted the death of the password at the RSA Security Conference in 2004. Since then, many thousands of others have piled on. And despite all these claims of the imminent extinction of the password, rather than being relegated to the wastebin of antiquated IT practices, passwords seem no less relevant in 2020 today than in 2004.

While a password remains an important first stage in any authentication process, what has changed is that a password today is less likely to be used as the sole security mechanism.

This past July, the Center for Internet Security (CIS) published a Password Policy Guide. This document is packed with advice, backed by solid research, on how to approach passwords in your environment. One of the really interesting parts of the CIS document is the section, How Important is a User’s Password?

In this blog we will assess common password attack vectors, calculate some password cracking probabilities, and unpack key guidance from CIS and NIST on password security, and discuss the different implications in protecting human versus machine passwords.

What You Should Know about Password Attacks

When evaluating the data on the various password exploits, it’s clear that the vast majority involve the hacker obtaining the entire password. Once someone obtains your whole password, the complexity of the password is irrelevant.

However, password complexity is only important with regards to guessing attacks. Guessing attacks involve the attacker working through possible variants of passwords in one of two ways:

  1. Online - directly with the system they are trying to hack – not just on the Internet
  2. Offline - usually with the database of user accounts and passwords

Leveraging tools that specialize in high-volume, complex mathematics, such as graphics processors, guessing attacks are increasingly more effective at cracking passwords. Rigs intended for mining new cryptocurrencies also serve as brilliant password cracking tools.

CIS indicates that these cryptocurrency/password-cracking rigs can easily achieve 100 billion tests per second. CIS also suggests that well-funded attackers, perhaps Nation States, could reach 100 or 1000 times that rate. While that seems like a scary capability for any attacker to have, keep in mind that performing 100 billion tests per second would still mean it takes the attacker roughly 20 years to test every possible combination in a 10-character password. Statistically you’d expect an average of half that number to break a password (so, a mere 10 years), but don’t take that as an excuse to use ‘aaaaaaaaaa’ as a password--that’s likely to be the first test!

How Password Policies can be Undermined by their Unintended Consequences

For years, we’ve asked our users (employees, vendors, customers, etc.) to choose complex passwords. We’ve frequently required them to have a capital letter, a symbol, and a number in their password.

How many times do you think these password creation instructions have resulted in a capital letter at the start and the symbol and number at the end? After all, we are working with people. In trying to make the passwords memorable to themselves, humans fall into predictable habits, and these habits translate into password patterns that are more easily guessed.

NIST suggests that users select 4-5 random words, then create a simple story to help remember those words. Passphrases are another approach, but tend to lead to the initial capitalized letter and the symbol at the end, where those characters are required. While both of these approaches do lead to longer passwords, they tend to be significantly less complex than random passwords of similar length.

Comparing Word-based Versus Character-based Passwords

There are approximately 96 easily typed characters that may be used in a password. Some systems do not permit all those characters in passwords, but for the sake of our example, we’ll go with 96.

A password composed of 5 random words, without spaces, is likely to yield around 20-25 characters. Most adults know between 20,000 to 35,000 words in their native language, but only use around 7,000 per day.

We can work out the number of possible passwords easily by calculating the number of possible words raised to the power of the number of words in our password. In this case, that’s 7000^5, which equals 16,807,000,000,000,000,000 possible combinations to check!

As already mentioned, 5 words would result in around 20-25 characters (based on average word length in English)—let’s go with 20 characters for a random password. We use the same formula, number of possible characters to the power of the number of characters in our password: 96^20, or 4,420,024,338,794,077,316,988,270,789,431,736,139,776 possible combinations!

You can immediately see that the possible random character passwords are massively larger than the random words, and the same is true for passphrases. For those interested, it’s around two hundred and sixty-two quintillion times more combinations using random characters (262,987,108,870,951,229,665). Even using 1,000 crypto mining rigs, it could take 100 million times the age of the universe to crack.

Passphrases and the NIST guidance will lead to better passwords than just letting people loose with the length and complexity requirements. This is where password managers become so valuable. Password management tools can generate random passwords, and also eliminate the need for users to remember them.

Passwords are not the compete answer for secure authentication. Most passwords that fall into the wrong hands aren’t discovered via brute force attacks. Rather, the passwords are already known since they’ve been reused across many systems and have been compromised elsewhere. A Google survey release last year found that 65% of people use the same passwords across multiple accounts, with 13% of them using the same password across all accounts!

Often, password re-use traverses both work and personal accounts. The typical user may engage in riskier activities on their personal device, while also lacking enterprise-grade endpoint security and other protections. If they’re re-using their passwords across personal and work accounts, they can potentially provide attackers with an easy pathway into the enterprise.

How MFA Boosts Secure Authentication

To increase password security, we need to layer on additional types of authentication, starting with multi-factor authentication (MFA).

MFA involves using three types of things that a person can present to prove who they are:

  • Something they know
  • Something they have
  • Something they are

Commonly these are:

  • Password/Passphrase
  • Mobile phone, hardware token, smart card
  • Biometrics - iris, fingerprint, face

When we add one or more of these “things” together, it becomes dramatically harder for a hacker to gain access to the system. Knowing someone’s password, or even managing to guess it (assuming that system controls prevent you just trying password after password), doesn’t get you their ‘something they have’ or their ‘something they are’. The systems behind each of these “things” have flaws, but when these “things” are combined together, they are virtually uncrackable. This is the authentication security multiplier benefit MFA brings to the equation.

Password Best Practices

The CIS Password Policy Guide does a great job in explaining MFA and highlighting its benefits for your organization. CIS even suggests that an 8-character password is enough when you have MFA in place. So, while the password is not dead, it’s not the sole authentication mechanism that it once was.

While 8-character password combined with MFA may suffice for individual human accounts, when computers are authenticating to other computers, or accounts are shared between individuals, life is complicated by MFA.

With shared accounts, any additional factors for authentication need to either be either:

A. Replicated across multiple people (i.e., a token that generates the same code for everyone at the same time), or

B. A system that allows multiple biometric inputs (at least one per person sharing the account)

That’s a lot to manage. It also equates to a reduction in the security of each of the factors involved – it only takes 1 of X tokens to be dropped. This may not cause an alert as quickly as a single token being lost, or leads to greater chance of a biometric being accepted when there are many more faces, irises, or fingerprints that need to be matched.

Where machines are involved, we may only have passwords to rely on as the sole factor for authentication. Again, I’ll leave it to the reader to work through why the other factors aren’t applicable.

In these scenarios involving shared accounts or machines, we want to have complex passwords (as hackers are more likely to want to brute force these accounts). For added security, we also want to avoid revealing those passwords to the end users.

Privileged password management solutions, like BeyondTrust’s Password Safe, combine the best practices for individual account security with secure access to highly privileged accounts to ensure shared account access is safe. Password Safe also provides a RESTful API to allow applications and systems to retrieve the complex passwords they need, when they need them, obviating the need to store the passwords within the applications or systems.

Password Safe can also change the password (called password rotation) every time the account has been used and/or periodically, regardless of whether or not the account has been used. Frequent rotation helps mitigate, or altogether prevent, the threat of password re-use exploits.

When you don’t need to type in the password, there’s no reason to have less than the maximum length and maximum complexity passwords, which, in Active Directory, is 256 characters long, or 96^256 using the formula from above. That yields quite a few variations:

2,893,581,093,653,115,164,161,933,786,472,865,307,054,850,041,555,834,807,355,298,357,642,001,423,684,509,786,184,682,298,590,635,716,509,504,238,070,459,087,259,590,817,323,666,539,508,810,439,967,185,702,245,033,781,585,657,410,029,342,566,710,267,132,793,508,977,853,052,011,101,184,140,289,457,212,117,185,180,173,761,609,884,498,478,888,471,718,658,247,296,255,463,743,905,631,817,450,244,636,975,035,278,666,832,015,000,463,901,835,813,563,758,653,390,341,071,714,156,276,249,876,315,300,734,154,815,463,209,135,058,113,530,000,241,578,181,162,922,756,470,061,142,398,947,545,341,305,520,436,069,696,846,657,264,445,648,545,131,545,392,904,495,641,540,294,844,346,269,696 - to be precise!

Steps to Protect Your Human & Machine Passwords

While password complexity may not play a part in many of the attacks than happen today, if we all use different, random, relatively long (12+ characters) passwords for every system we use, we will make it exponentially more challenging, and unlikely, for the hackers to win. Password Managers and Privileged Password and Session Management Solutions play an essential role here. If we also use MFA, wherever possible, for individual accounts (and many Personal Password Managers can help there too!), then we could just win this battle.

Like all security systems, password security is all about layers of protecting and not relying on just one thing to keep us safe. That said, we need to start somewhere. and the CIS Password Policy Guide is a great start for passwords for people. For guidance on securing privileged passwords for humans and machines (applications, RPA, etc.) check these resources:


Whitepapers

Privileged Password Management Explained

Datasheets

Password Safe

Videos

Demo: BeyondTrust Password Safe

Photograph of Brian Chappell

Brian Chappell, Chief Security Strategist

Brian has more than 30 years of IT and cybersecurity experience in a career that has spanned system integrators, PC and Software vendors, and high-tech multi-nationals. He has held senior roles in both the vendor and the enterprise space in companies such as Amstrad plc, BBC Television, GlaxoSmithKline, and BeyondTrust. At BeyondTrust, Brian has led Sales Engineering across EMEA and APAC, Product Management globally for Privileged Password Management, and now focuses on security strategy both internally and externally. Brian can also be found speaking at conferences, authoring articles and blog posts, as well as providing expert commentary for the world press.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Cybersecurity Insurance Checklist

Whitepapers

Privileged Access Management: PAM Checklist

Whitepapers

Azure PIM vs. BeyondTrust PAM

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support
  • Cloud Privilege Broker

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Podcast
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press
BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2022 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.