Security Evaluation of Password Managers: A Comparative Analysis and Penetration Testing of Existing Solutions

Authors

DOI:

https://doi.org/10.34190/iccws.20.1.3330

Keywords:

password managers, Cyber security, Encryption, Penetration Testing, Security Analysis

Abstract

In both personal and organizational contexts, password managers have become indispensable tools for the protection and management of sensitive digital information. With the growing reliance on online services, the security of password storage solutions is paramount to defending against data breaches, unauthorized access, and other forms of cyber-attacks. This paper presents a detailed analysis of password managers over the last two decades, focusing on the evolution of security mechanisms and strategies for safeguarding master passwords, encryption methodologies, and backup procedures. By tracing the historical development of these tools, significant advancements in securing user credentials are highlighted. A thorough evaluation of the most widely used password managers, such as LastPass, 1Password, Bitwarden, or Dashlane, is conducted, with attention to their adherence to modern security standards, including encryption algorithms (e.g., AES-256), zero-knowledge architecture, and multi-factor authentication. The comparative analysis identifies both the strengths and weaknesses of these solutions, particularly in how effectively they defend against common attack vectors such as brute-force attacks, phishing, and malware. In the practical section, a structured penetration testing framework is introduced to assess the resilience of selected password managers under various real-world attack scenarios. This framework is intended not only to evaluate the current robustness of these tools but also to offer insight into potential vulnerabilities that may not yet be widely recognized. While the discovery of significant new security flaws is not anticipated, this evaluation serves as a validation of the security models employed by these products. The findings are expected to contribute to the ongoing development of more secure password management solutions, offering practical recommendations for developers, security professionals, and end-users. The paper concludes with a forward-looking discussion on how emerging cybersecurity trends, such as biometrics, decentralized security models, and quantum computing, may shape the future of password management tools.

Author Biographies

Petr Gallus, University of Defence, Czechia

P. GALLUS was born in Czech Republic in 1998. He received the M.S.
degree in IT from the military University of Defense in 2022. Same year he continued his studies on the University as Ph.D. candidate at Department of Informatics and Cyber Ops. During 2024 he was on internship at NATO CCDCOE, Tech branch. He focuses on Red Teaming and Artificial Intelligence research.

Dominik Stanek, University of Defence, Czechia

Dominik Staněk is a doctoral student at the University of Defence, Czechia. In 2024, he graduated from the University of Defence, Czechia, with a master’s degree in Cyber Security. He works at the Department of Informatics and Cyber Operations at the same university. His research interests include artificial intelligence, particularly its explainability, trustworthiness, and adversarial attacks on AI systems.

Ivo Klaban, University of Defence, Czechia

Lt-COL. Ivo Klaban, M. Sc., University of Defence, Brno, The Czech Republic was a part of the army Computer Incident Response Capability technical centre for more than a dozen years. His role was Deputy Director of the CIRC Centre and among his managerial tasks he also identified cyber security threats and incidents through continuous monitoring of data networks, he analysed, evaluated and reported gained information about incidents to relevant partners. Since 1. 1. 2021 he has been a Head of Cyber Operations Group at Department of Informatics and Cyber Operations back at his alma mater the University of Defence.

Downloads

Published

2025-03-24