Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Help Keep Boards Alive. Support us by going ad free today. See here: https://subscriptions.boards.ie/.
If we do not hit our goal we will be forced to close the site.

Current status: https://keepboardsalive.com/

Annual subs are best for most impact. If you are still undecided on going Ad Free - you can also donate using the Paypal Donate option. All contribution helps. Thank you.

Password Cracking

2»

Comments

  • Registered Users, Registered Users 2 Posts: 9,165 ✭✭✭jmreire


    Thanks, yes, I still have the same laptop that was used to create the password on the USB drive, and I'll ask someone who understands computerd to have a look at it as you suggest. Again, Thanks for your help.



  • Registered Users Posts: 359 ✭✭the O Reilly connection


    I started using a password manager years ago even though I really didn't know the principle behind it. There are now online GPUs which can break passwords in seconds. It's as simple as uploading a file and the GPUs do the work.



  • Registered Users, Registered Users 2 Posts: 12,896 ✭✭✭✭the_amazing_raisin


    With all passwords is depends on the complexity to determine how quickly it will be cracked

    Mostly people refer to a chart like below for an estimate of how long it will take to break a password

    image.png

    You can see that simple passwords consisting of lowercase letters or numbers are quite easy to crack when the length is short

    However a fairly complex password incorporating upper and lowercase letters, numbers and symbols quickly adds a few million years onto the time

    Even a collection of dictionary words can be considered secure as long as they don't form part of a phrase that's vulnerable to a dictionary attack

    For example "table pipe yellow badger" is more secure than "a really strong password"

    Add uppercase letters, numbers and symbols and you'll have a fairly robust password

    "?Table 46 Pipe-Yellow 19 Badger!" should keep a cluster of GPUs cooking for a few thousand years

    There's also the value of the information being stolen to consider. I'm hoping no-one here has access to nuclear launch codes so most likely the information in any of our accounts isn't worth the expense of cracking the password

    This is why phishing, ransomware and other scams are the more common ways of stealing passwords. They're a lot cheaper to run and can be targeted at a larger audience so are more likely to yield a profit

    "The internet never fails to misremember" - Sebastian Ruiz, aka Frost



  • Registered Users, Registered Users 2 Posts: 32,857 ✭✭✭✭AndrewJRenko


    What do you mean by 'break a password'? Based on what input?



  • Registered Users Posts: 359 ✭✭the O Reilly connection


    I know programs such as Hashcat and Hydra are designed to break passwords. They can be enhanced by using online GPUs.



  • Advertisement
  • Registered Users, Registered Users 2 Posts: 12,151 ✭✭✭✭LambshankRedemption


    Hydra doesn't crack passwords, it's used to brute force multiple different protocols.



  • Registered Users, Registered Users 2 Posts: 32,857 ✭✭✭✭AndrewJRenko


    There was a response earlier that gave a more direct answer, that these software tools were cracking passwords based on a hashed password picked up on wifi, is that correct?



  • Registered Users, Registered Users 2 Posts: 12,896 ✭✭✭✭the_amazing_raisin


    I've just realised that my answer earlier today was basically just a rehased version of the same answer earlier in this thread

    Ah the dangers of thread resurrection...

    As for understanding how password managers work, imagine putting your house keys in a lock box that you only know the code to and leaving it with a courier

    For the purposes of this example assume the lockbox is made from an alloy of Mithril and the stuff coating Wolverine's bones (in other words, its unbreakable)

    When you need your keys, ring up the courier and they'll give you the lock box which you open using the code only you know

    The courier doesn't know your code so can't steal or accidentally give away your keys. If someone manages to steal the lock box then it's no use because they don't know the code either

    "The internet never fails to misremember" - Sebastian Ruiz, aka Frost



  • Registered Users, Registered Users 2, Paid Member Posts: 7,466 ✭✭✭Allinall


    The courier can demand €5,000 to give you access to your keys.

    Where do you hide the spare ones?



  • Registered Users, Registered Users 2 Posts: 12,896 ✭✭✭✭the_amazing_raisin


    Also if anyone wants to do a bit of password theft, it's quite easy to do without any cracking

    First, download Unity game engine and throw together some crappy game using the example code and whatever free assets you can find online (this is called an asset flip)

    Second, embed a background running keylogger into your game installer. Bundle the keylog into the analytics data for the game so it gets sent back to you. While you're at it put a crypto miner into the installer as well for some passive income

    Third, put the game on Steam Early Access at €20 and then discount it by 90% so it ranks high in the sales. Do some nice GenAI cover art based on popular games so it looks cool

    Finally for some added boost, make a bunch of game keys and chuck them on G2A in some random key bundles. Maybe even pay for a bot farm to download your game and boost it up the trending results

    After all that enjoy all the passwords you can steal while having some passive income by selling a scam game that mines crypto using other people's computers

    "The internet never fails to misremember" - Sebastian Ruiz, aka Frost



  • Advertisement
  • Registered Users, Registered Users 2 Posts: 12,896 ✭✭✭✭the_amazing_raisin


    Well that's the problem with analogies isn't it 😉

    In the case of a password manager, you have an encrypted copy of all the password files on your devices. The manager just syncs the changes to the file across your devices

    You'll have a passphrase which forms part of the key to decrypt the file

    They could in theory threaten to revoke access unless you pay them and it is a credible threat if the manager service doesn't disclose the encryption method

    I'd wager doing so would cause some negative publicity and a downturn in sales, so unlikely to happen

    Personally I use BitWarden partly because it's open source and isn't vulnerable to these types of shenanigans and can be self hosted if desired

    "The internet never fails to misremember" - Sebastian Ruiz, aka Frost



  • Registered Users, Registered Users 2, Paid Member Posts: 38,419 ✭✭✭✭Hotblack Desiato


    You're either not reading or not understanding the replies you are getting on this thread

    I'm partial to your abracadabra,

    I'm raptured by the joy of it all.



Advertisement