16 C
New York
Friday, October 10, 2025

Can we repair the weaknesses in password-based authentication?


Can we repair the weaknesses in password-based authentication?

In password-based authentication, end-users verify their id utilizing login credentials, generally a novel username, and a secret password. These credentials enable the system to confirm that the consumer is who they are saying they’re, and defend it from unauthorized entry.

But, take a look at any latest cybersecurity or information breach report, and also you’ll discover that these credentials have the precise reverse impact.

There are billions of stolen credentials circulating the darkish net and the underground market is prospering on granting entry to those compromised accounts. For organizations, it’s simply as correct to imagine that worker credentials might be leveraged to entry delicate information, versus defending it.

This is applicable to all password-based techniques, even when extra safeguards like multifactor authentication are in place. Unhealthy actors are countering extra authentication layers with MFA immediate bombing, session hijacking, and phishing assaults.

So, what choices do we now have to strengthen credentials and defend private and enterprise information, a minimum of till we will transition to passwordless authentication?

Earlier than they have been breached, they have been weak

Let’s assume that each single password we now have ever used is thought to dangerous actors. The answer could be to vary all of them, proper? Whereas that’s an excellent begin, it doesn’t truly cease them from falling into the incorrect fingers once more.

The issue, and maybe the foundation of the inherent weaknesses in password-based authentication, is the predictability of human-behavior.

Many customers default to weak, easy-to-remember passwords, and have a tendency to reuse those self same passwords throughout most of their accounts. Immediately’s password assaults are designed with this predictability in thoughts.

Brute-force assaults

A brute-force assault is without doubt one of the most typical strategies for guessing a consumer’s username and password. In its most simple type, the attacker will trial-and-error all doable username and password combos, via numerous automated login makes an attempt, till the proper one is discovered.

To make the assault simpler, extra ways can be utilized to scale back the amount of guesses. For instance, utilizing a pre-defined checklist of high-probability passwords, or utilizing details about password creation habits, like character composition patterns.

Whereas most password insurance policies will encourage and even power customers to create high-entropy passwords, which in idea are tougher to crack, end-users will at all times circumvent these measures in favor of comfort.

So long as end-users proceed to make use of passwords like “pizza123”, which was allegedly used within the Quick Firm breach, these assaults will proceed to work.

Ideas for securing password-based authentication

There are a selection of measures we will implement to reduce the weaknesses related to end-user credentials.

The primary measure could be countering brute-force username and password makes an attempt by limiting unsuccessful login makes an attempt, and guaranteeing that the login mechanism, together with any error messages, don’t verify the validity of username submissions.

For web going through net purposes, these authentication measures needs to be repeatedly examined through a pen-testing as a service supplier.

Subsequent, we must always use password complexity necessities to power customers to pick out stronger passwords. These complexity settings shouldn’t be restricted to size, and character necessities.

password coverage may also stop frequent character patterns, and leetspeak, whereas encouraging passphrases, that are each longer and simpler to recollect.

Lastly, even with these measures in place, we will’t cease customers from reusing these passwords throughout different accounts, together with their private accounts. The prevalence of password reuse will increase the chance of compromise.

Any group who takes an assume breach stance might want to proactively test consumer passwords towards a repeatedly up to date checklist of breached passwords.

If a consumer’s password is discovered on the breached password checklist, they need to be prompted to vary it instantly. The identical breached password checklist will also be used to dam customers from choosing compromised passwords within the first place.

Securing Lively Listing passwords and the keys to the dominion

For many windows-based networks, Lively Listing is the chosen id and entry administration answer. Securing Lively Listing is at all times top-of-mind, because it holds the proverbial keys to the dominion. Sadly, Lively Listing isn’t resistant to the password-based authentication challenges we now have outlined above.

To additional strengthen password safety, a third-party password coverage device, like Specops Password Coverage, can implement extra complexity necessities, and disallow frequent passwords creation patterns that may go away it weak to assaults.

This consists of keyboard stroll patterns (qwerty), leetspeak (P@$$w0rd), base phrases (password, admin, welcome), and customized dictionary phrases to dam particular phrases which might be related to a consumer or enterprise (firm title, product title, location, and so on).

Specops Password Coverage with Breached Password Safety additionally blocks using over 4 billion distinctive compromised passwords and gives steady compromised password scanning.

To detect using compromised passwords inside Lively Listing, Specops Software program additionally gives a really feel device, Specops Password Auditor. This read-only reporting device scans your Lively Listing surroundings and helps establish accounts utilizing over 950 million identified breached passwords, together with different password-related vulnerabilities.

The inherent weaknesses of password-based authentication are right here to remain. Even when extra safety measures, like MFA, are in place, we nonetheless must optimize our password insurance policies to counter poor password practices.

Should you’re not fairly able to go passwordless, however must safe current passwords, contact Specops Software program to assist.

Sponsored and written by Specops Software program

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles