Does a local password increase security against remote attacks?

bur

New Member
Joined
Mar 25, 2017
I have a user account password on my Windows 10 machine at home and am wondering whether this actually increases security against remote attackers or if it's solely for protecting against local attacks.
 
A local password is going to increase security in both cases, I'd say more so in the remote scenario since a user with physical access with the right tools and remove the password.
 
How does it help against remote attacks?

I'm wondering if it does anything if the active user has admin rights as is usually the case.
 
With remote attacks and no password on your Admin account, there are bots roaming the Internet between the hours of 12AM midnight and 5AM or so specifically LOOKING for unprotected computers with no passwords. Those bots gather that list--which is quite large (thousands of computers), and send the lists to nefarious cybercriminals and hackers. At that point, they go after those computers first. Once they are in, they can do whatever they want to your computer without even breaking a sweat. :skull:

A favorite analogy I used with my Computer students is that when crooks roam the shopping mall parking lots at Christmas, they go after cars that are unlocked for obvious reasons. It takes an experienced thief 2-3 minutes to break a lock on a car door, or jimmy it, or use electronic gadgets to unlock them. It only takes 6-10 seconds for them to try a door handle and get into your car. If you were a burglar which method would you choose? Of course they look for cars that are already unlocked, and sometimes they will get lucky enough to find an unlocked car with keys left in the ignition--say goodbye to that car! It couldn't be any easier for them. By leaving your computer on the Internet 24x7x365 as most home users do these days with the advent of always-on Broadband Internet (Cable & DSL both); you will never even see it coming, as most likely you will be asleep during those late night or early morning hours! It only takes seconds to get into your computer, and steal your personal information, and if the criminal is hiding their tracks, erase your Windows or wipe everything off your hard drive so that their activity cannot be traced back to them! :headache:

Back to your Remote hacking question again. Determined hackers can still gain access to your PC even with a good password on your computer, but why bother to attack your computer with a password (like the crooks looking for unlocked cars in the Mall parking lots), when there are thousands of other computers that are already unlocked and unprotected with no password on them!:pirate: This has been proven and well documented, and when I showed students how to do this when teaching my Computer Forensics classes, they couldn't believe how easy it was.

You may not be aware of this, as few people are who don't work in the Computer Industry for a living.

Hope that answers your question.
<<<BIGBEARJEDI>>>
 
There are still many many ways an attacker can gain access to a system, passwords are just one line of defense. If the system is behind a NAT router it's more difficult to access the systems behind it, but not impossible.
 
Thanks for your replies. I agree, every small step that increases the time an attacker has to put into a hack greatly increases security as long as there are enough unprotected targets.

I'm wondering from a strictly technical point of view. How does a password stop a remote attacker? The current user is already logged in, so I assume to run code with the user's privileges the attacker doesn't need a password if he exploits a browser vulnerability for example? And since under Windows most default users have admin rights that opens the whole machine (UAC taken aside, but that doesn't ask for a password as well).

So in short my question is, in what scenario does Windows request the password from a remote attacker?
 
A long password would help in the event someone tried to brute force their way into your computer either through RDP, Remote assist or trying to access your filesystem or registry remotely or through some service you have exposed to the internet. The vast majority of compromised systems 70-90% happen due to some form of malware on a system usually delivered via a known or zero day exploit in a browser or through some form of social engineering.
 
The vast majority of compromised systems 70-90% happen due to some form of malware on a system usually delivered via a known or zero day exploit in a browser or through some form of social engineering.
And in those cases, does a password help?
 
Back
Top Bottom