{"id":185,"date":"2021-11-14T16:45:54","date_gmt":"2021-11-14T16:45:54","guid":{"rendered":"https:\/\/www.davincivirus.com\/?p=185"},"modified":"2021-11-14T16:45:54","modified_gmt":"2021-11-14T16:45:54","slug":"weak-cryptography-seed","status":"publish","type":"post","link":"https:\/\/www.davincivirus.com\/?p=185","title":{"rendered":"Weak Cryptography Seed"},"content":{"rendered":"\n<p>The effectiveness of a cryptographically-secure pseudorandom number generator is heavily reliant upon the seed.  This initial &#8220;seed&#8221; value must be derived from a random source.  A predicable seed value can permit an attacker to discern output.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" src=\"https:\/\/www.davincivirus.com\/wp-content\/uploads\/2021\/11\/w3schoolsRandom.jpg\" alt=\"\" class=\"wp-image-187\" width=\"485\" height=\"129\" srcset=\"https:\/\/www.davincivirus.com\/wp-content\/uploads\/2021\/11\/w3schoolsRandom.jpg 647w, https:\/\/www.davincivirus.com\/wp-content\/uploads\/2021\/11\/w3schoolsRandom-300x80.jpg 300w\" sizes=\"(max-width: 485px) 100vw, 485px\" \/><figcaption>SOURCE: W3 Schools lab.<\/figcaption><\/figure><\/div>\n\n\n\n<h2>Exploitation<\/h2>\n\n\n\n<p>Applications are often dependent upon random number generators to help create default\/reset passwords.  In this scenario, an attacker can take advantage of poorly seeded randomness to predict passwords.  <\/p>\n\n\n\n<p>An attacker will utilize an account under their control gain access to a sample-set of passwords.  They can then use offline brute forcing techniques that attempt to identify insecure randomness; not a trivial task.  Once the attacker can successfully predict the output random password generator, they can subsequently attempt to gain access to other user accounts.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" src=\"https:\/\/www.davincivirus.com\/wp-content\/uploads\/2021\/11\/passwordCracking.jpg\" alt=\"\" class=\"wp-image-186\" width=\"460\" height=\"361\" srcset=\"https:\/\/www.davincivirus.com\/wp-content\/uploads\/2021\/11\/passwordCracking.jpg 613w, https:\/\/www.davincivirus.com\/wp-content\/uploads\/2021\/11\/passwordCracking-300x235.jpg 300w\" sizes=\"(max-width: 460px) 100vw, 460px\" \/><\/figure><\/div>\n\n\n\n<h2>Remediation<\/h2>\n\n\n\n<p>The effectiveness of cryptography is heavily reliant upon secure implementation.  To avoid common pitfalls, ensure that all documentation for the selected API is thoroughly reviewed before use.  Ensure that all initial seeds embedded within the logic are derived from random\/unpredictable sources.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The effectiveness of a cryptographically-secure pseudorandom number generator is heavily reliant upon the seed. This initial &#8220;seed&#8221; value must be&hellip; <a class=\"read-more\" href=\"https:\/\/www.davincivirus.com\/?p=185\">Continue Reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[9],"tags":[],"_links":{"self":[{"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=\/wp\/v2\/posts\/185"}],"collection":[{"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=185"}],"version-history":[{"count":1,"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=\/wp\/v2\/posts\/185\/revisions"}],"predecessor-version":[{"id":188,"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=\/wp\/v2\/posts\/185\/revisions\/188"}],"wp:attachment":[{"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.davincivirus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}