Evaluating Windows Vista user account security

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to res...

Full description

Bibliographic Details
Main Author: Baghdad Science Journal
Format: Article
Language:Arabic
Published: College of Science for Women, University of Baghdad 2011-06-01
Series:Baghdad Science Journal
Subjects:
Online Access:http://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/2816
id doaj-c04aa64742c94c15b6f78aec3d03f27a
record_format Article
spelling doaj-c04aa64742c94c15b6f78aec3d03f27a2020-11-25T01:52:01ZaraCollege of Science for Women, University of BaghdadBaghdad Science Journal2078-86652411-79862011-06-018210.21123/bsj.8.2.419-428Evaluating Windows Vista user account securityBaghdad Science JournalIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of passwords, it is very useful to know how effective the widely available applications for cracking passwords. This research analyzes, in which way an attacker is able to obtain the password of a Windows Vista PC. During this research the physical access to the PC is needed. This research shows that password consists of 8 characters with small letter characters and numbers can easily be cracked if it has know usual combinations. Whereas a Dictionary Attack will probably not find unusual combinations. Adding captel letter characters will make the process harder as there are several more combinations, so it will take longer time but is still feasible. Taking into account special characters it will probably take too long time and even most Dictionary Attacks will fail. For rainbow tables the size of the table has to be considered. If it is not too big, even these small passwords cannot be cracked. For longer passwords probably the simplest ones, small letter characters and numbers, can be cracked only. In this case brute force takes too long time in most cases and a dictionary will contain only a few words this long and even the rainbow tables become too large for normal use. They can only be successful if enough limitations are known and the overall size of the table can be limited.http://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/2816Operating System, System Security, Authentication System, Trusted Computing, Windows Vista, Memory Protection.
collection DOAJ
language Arabic
format Article
sources DOAJ
author Baghdad Science Journal
spellingShingle Baghdad Science Journal
Evaluating Windows Vista user account security
Baghdad Science Journal
Operating System, System Security, Authentication System, Trusted Computing, Windows Vista, Memory Protection.
author_facet Baghdad Science Journal
author_sort Baghdad Science Journal
title Evaluating Windows Vista user account security
title_short Evaluating Windows Vista user account security
title_full Evaluating Windows Vista user account security
title_fullStr Evaluating Windows Vista user account security
title_full_unstemmed Evaluating Windows Vista user account security
title_sort evaluating windows vista user account security
publisher College of Science for Women, University of Baghdad
series Baghdad Science Journal
issn 2078-8665
2411-7986
publishDate 2011-06-01
description In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of passwords, it is very useful to know how effective the widely available applications for cracking passwords. This research analyzes, in which way an attacker is able to obtain the password of a Windows Vista PC. During this research the physical access to the PC is needed. This research shows that password consists of 8 characters with small letter characters and numbers can easily be cracked if it has know usual combinations. Whereas a Dictionary Attack will probably not find unusual combinations. Adding captel letter characters will make the process harder as there are several more combinations, so it will take longer time but is still feasible. Taking into account special characters it will probably take too long time and even most Dictionary Attacks will fail. For rainbow tables the size of the table has to be considered. If it is not too big, even these small passwords cannot be cracked. For longer passwords probably the simplest ones, small letter characters and numbers, can be cracked only. In this case brute force takes too long time in most cases and a dictionary will contain only a few words this long and even the rainbow tables become too large for normal use. They can only be successful if enough limitations are known and the overall size of the table can be limited.
topic Operating System, System Security, Authentication System, Trusted Computing, Windows Vista, Memory Protection.
url http://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/2816
work_keys_str_mv AT baghdadsciencejournal evaluatingwindowsvistauseraccountsecurity
_version_ 1724995259384987648