{"id":238,"date":"2013-05-09T00:00:00","date_gmt":"2013-05-09T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/09\/sweet-password-security-strategy-honeywords\/"},"modified":"2021-12-30T11:36:49","modified_gmt":"2021-12-30T11:36:49","slug":"sweet-password-security-strategy-honeywords","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/09\/sweet-password-security-strategy-honeywords\/","title":{"rendered":"Sweet Password Security Strategy: Honeywords"},"content":{"rendered":"<p>Businesses should seed their password databases with fake passwords and then monitor all login attempts for use of those credentials to detect if hackers have stolen stored user information. The term &#8220;honeywords&#8221; is a play on &#8220;honeypot,&#8221; which in the information security realm refers to creating fake servers and then learning how attackers attempt to exploit them &#8212; in effect, using them to help detect more widespread intrusions inside a network. The honeywords concept is also elegant because any attacker who&#8217;s able to steal a copy of a password database won&#8217;t know if the information it contains is real or fake.&nbsp;&nbsp;&nbsp;An auxiliary server (the &#8220;honeychecker&#8221;) can distinguish the user password from honeywords for the login routine and will set off an alarm if a honeyword is submitted.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Sometimes administrators set up fake user accounts (&#8220;honeypot accounts&#8221;) so that an alarm can be raised when an adversary who has solved for a password for such an account by inverting a hash from a stolen password file then attempts to login,&#8221; they said.<\/p>\n<p style=\"margin: 0px;\">Accordingly, they recommend adding multiple fake passwords to every user account and creating a system that allows only the valid password to work and that alerts administrators whenever someone attempts to use a honeyword. &#8220;This approach is not terribly deep, but it should be quite effective, as it puts the adversary at risk of being detected with every attempted login using a password obtained by brute-force solving a hashed password,&#8221; they said.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">On the other hand, if numerous attempted logins are made using honeywords, or if honeyword login attempts are made to admin accounts, then it&#8217;s more likely that the password database has been stolen. But as numerous breaches continue to demonstrate, regardless of the security that businesses have put in place, they often fail to detect when users&#8217; passwords have been compromised. But that approach is insecure, and password-security experts have long recommended that businesses use built-for-purpose password hashing algorithms such as bcrypt, scrypt or PBKDF2, which if properly implemented are much more resistant to brute-force attacks.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">That&#8217;s why an early warning system such as the use of honeywords might buy breached businesses valuable time to expire passwords after a successful attack, before attackers have time to put the stolen information to use.<\/p>\n<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">Link: <a href=\"http:\/\/www.informationweek.com\/security\/intrusion-prevention\/sweet-password-security-strategy-honeywo\/240154334\">http:\/\/www.informationweek.com\/security\/intrusion-prevention\/sweet-password-security-strategy-honeywo\/240154334<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-238","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=238"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/238\/revisions"}],"predecessor-version":[{"id":2725,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/238\/revisions\/2725"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}