Jump to content

Your 8 char random password now means nothing

lacion

Worst thing is.... A governmental website here only allows passwords up to 8 characters. Insane.

CPU: AMD Ryzen 3700x / GPU: Asus Radeon RX 6750XT OC 12GB / RAM: Corsair Vengeance LPX 2x8GB DDR4-3200
MOBO: MSI B450m Gaming Plus / NVME: Corsair MP510 240GB / Case: TT Core v21 / PSU: Seasonic 750W / OS: Win 10 Pro

Link to comment
Share on other sites

Link to post
Share on other sites

6 hours ago, Firewrath9 said:

thats why they have a cooldown after you guess a password. 3 seconds after every mistake = .3H/s

This is assuming you have a database dump of the hashed passwords

Don't ask to ask, just ask... please 🤨

sudo chmod -R 000 /*

Link to comment
Share on other sites

Link to post
Share on other sites

You know what's going to be the worst?
Bank PIN numbers

Specs: Motherboard: Asus X470-PLUS TUF gaming (Yes I know it's poor but I wasn't informed) RAM: Corsair VENGEANCE® LPX DDR4 3200Mhz CL16-18-18-36 2x8GB

            CPU: Ryzen 9 5900X          Case: Antec P8     PSU: Corsair RM850x                        Cooler: Antec K240 with two Noctura Industrial PPC 3000 PWM

            Drives: Samsung 970 EVO plus 250GB, Micron 1100 2TB, Seagate ST4000DM000/1F2168 GPU: EVGA RTX 2080 ti Black edition

Link to comment
Share on other sites

Link to post
Share on other sites

Which is why I use full ASCII passwords the length of 128+ characters for everything that matters. Good luck brute forcing that. What sucks the most is when retarded services limit your password creation options, like not allowing special characters other than _ or - or even lengths beyond 8 or 10 characters.

Link to comment
Share on other sites

Link to post
Share on other sites

13 hours ago, Giganthrax said:

Dang it. 

 

I would hope that organizations like PayPal, amazon, etc. that have access to our credit card & PayPal info are protected against this, though?

2FA when possible and increase your password characters.

Magical Pineapples


 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Link to comment
Share on other sites

Link to post
Share on other sites

They can't brute force login forms like this because every well designed system blocks when X number of failed attempts are made to prevent just this. They need to get password storage data directly first.

Link to comment
Share on other sites

Link to post
Share on other sites

14 hours ago, corrado33 said:

When I let the program run.... it eventually came up with a 20 GB text file. Yes, you read that correctly. A 20..... GB.... text file. I had to find a program to even open the damn thing let alone read it. (Vim works great for large files btw). Eventually, by including more strict conditions, (like not allowing the player to buy a farm then immediately sell it.) I got the file down to something more manageable (like 7 GB or so), then I ran my analysis program on it to determine which combination of moves was the best. That took all night, but eventually I solved it, and it made me so happy. But the scale of the whole project just amazed me. These dictionaries for passwords can be freaking MASSIVE. Turns out the answer was exactly the strategy that most people in the game already used. But I got  a lot of similar strategies so I was still happy.

sounds like a perfect use case of a neural network

                     ¸„»°'´¸„»°'´ Vorticalbox `'°«„¸`'°«„¸
`'°«„¸¸„»°'´¸„»°'´`'°«„¸Scientia Potentia est  ¸„»°'´`'°«„¸`'°«„¸¸„»°'´

Link to comment
Share on other sites

Link to post
Share on other sites

and that is why things like sentences are much better passwords long as hell and easier to remember.

Link to comment
Share on other sites

Link to post
Share on other sites

I do not even remember my passwords. I just remember algorithm i used to generate password in my head. This way when i want to log in on some website i regenerate password with that algorithm in my head and type it in.

Computer users fall into two groups:
those that do backups
those that have never had a hard drive fail.

Link to comment
Share on other sites

Link to post
Share on other sites

14 hours ago, ADM-Ntek said:

and that is why things like sentences are much better passwords long as hell and easier to remember.

depends on how you do them, it's not uncommon to start with a dictionary attack to see what fits then move on to more time consuming methods later, and don't think that 1337 5p34k$ are going to protect you, they either get next priority or lumped in with dictionary attacks

desktop

Spoiler

r5 3600,3450@0.9v (0.875v get) 4.2ghz@1.25v (1.212 get) | custom loop cpu&gpu 1260mm nexxos xt45 | MSI b450i gaming ac | crucial ballistix 2x8 3000c15->3733c15@1.39v(1.376v get) |Zotac 2060 amp | 256GB Samsung 950 pro nvme | 1TB Adata su800 | 4TB HGST drive | Silverstone SX500-LG

HTPC

Spoiler

HTPC i3 7300 | Gigabyte GA-B250M-DS3H | 16GB G Skill | Adata XPG SX8000 128GB M.2 | Many HDDs | Rosewill FBM-01 | Corsair CXM 450W

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

On 2/14/2019 at 8:19 PM, TetraSky said:

Worst thing is.... A governmental website here only allows passwords up to 8 characters. Insane.

My bank, BMO, only offers six characters, letters and/or numbers. Not even capitals or underscore. Also there's only soft 2FA, you get security questions if it's a new IP address. Can't even make the questions yourself, it's something like "name of your first friend". 

Desktop: 7800x3d @ stock, 64gb ddr4 @ 6000, 3080Ti, x670 Asus Strix

 

Laptop: Dell G3 15 - i7-8750h @ stock, 16gb ddr4 @ 2666, 1050Ti 

Link to comment
Share on other sites

Link to post
Share on other sites

So whats better now? 

"Chicken Television sunshine Christmas" 

Or

"M4-R4cE#2F4/me" 

 

37 Characters but with random words vs. 15 characters with random shit and special characters? 

 

Or a combination 

"Chicken#Television/sunshine@Christmas"

?

Gaming HTPC:

R5 5600X - Cryorig C7 - Asus ROG B350-i - EVGA RTX2060KO - 16gb G.Skill Ripjaws V 3333mhz - Corsair SF450 - 500gb 960 EVO - LianLi TU100B


Desktop PC:
R9 3900X - Peerless Assassin 120 SE - Asus Prime X570 Pro - Powercolor 7900XT - 32gb LPX 3200mhz - Corsair SF750 Platinum - 1TB WD SN850X - CoolerMaster NR200 White - Gigabyte M27Q-SA - Corsair K70 Rapidfire - Logitech MX518 Legendary - HyperXCloud Alpha wireless


Boss-NAS [Build Log]:
R5 2400G - Noctua NH-D14 - Asus Prime X370-Pro - 16gb G.Skill Aegis 3000mhz - Seasonic Focus Platinum 550W - Fractal Design R5 - 
250gb 970 Evo (OS) - 2x500gb 860 Evo (Raid0) - 6x4TB WD Red (RaidZ2)

Synology-NAS:
DS920+
2x4TB Ironwolf - 1x18TB Seagate Exos X20

 

Audio Gear:

Hifiman HE-400i - Kennerton Magister - Beyerdynamic DT880 250Ohm - AKG K7XX - Fostex TH-X00 - O2 Amp/DAC Combo - 
Klipsch RP280F - Klipsch RP160M - Klipsch RP440C - Yamaha RX-V479

 

Reviews and Stuff:

GTX 780 DCU2 // 8600GTS // Hifiman HE-400i // Kennerton Magister
Folding all the Proteins! // Boincerino

Useful Links:
Do you need an AMP/DAC? // Recommended Audio Gear // PSU Tier List 

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, FloRolf said:

So whats better now? 

"Chicken Television sunshine Christmas" 

Or

"M4-R4cE#2F4/me" 

 

37 Characters but with random words vs. 15 characters with random shit and special characters? 

 

Or a combination 

"Chicken#Television/sunshine@Christmas"

?

Don't use pure words from one language. A dictionary attack will resolve this quickly. Though it has to be noted, that the attacker doesn't know how many words are in your specific password. The longer the sentence the more possibilities there are. Still, the first passphrase is not good, since it relies on only English words correctly writte separated with spaces. The third one is better than the first one but still not good. Out of the 3 examples the second one is by far the most secure one though hard to remember. Leet Speak won't help much with your words, common patterns are covered by good dictionaries. 

 

You can use a proper password manager with random passwords of >12 characters in length protected by itself with a strong password an U2F 2FA. If you don't want to rely on password managers (you should though, because there's no way you'll remember strong passwords by the hundreds which is what you'd need to nowadays; some of them also support U2F sticks) use long phrases consisting of words from different languages mixed with special characters and odd misspellings. 

 

Do not use 2FA via SMS - ever! While this requires an attacer to target you specifically your security is still at risk.

Use the quote function when answering! Mark people directly if you want an answer from them!

Link to comment
Share on other sites

Link to post
Share on other sites

I feel like this is entirely solved by 16 digit passwords, combined with limited password entries before lockout.

 

Good luck guessing a 16 digit password with only 3 tries before it locks.

Ketchup is better than mustard.

GUI is better than Command Line Interface.

Dubs are better than subs

Link to comment
Share on other sites

Link to post
Share on other sites

On 2/16/2019 at 1:52 PM, Trik'Stari said:

Good luck guessing ... password with only 3 tries before it locks.

this was proven wrong like 3 times in the thread

MSI GX660 + i7 920XM @ 2.8GHz + GTX 970M + Samsung SSD 830 256GB

Link to comment
Share on other sites

Link to post
Share on other sites

So you're saying my 9 character passwords are still secure? Aww sweet. 

Link to comment
Share on other sites

Link to post
Share on other sites

We generate a seed based upon the Epoc (date period) that the user signs up on. This seed is stores in a seperate service (geographically different). So if you did get hold of the hashes of the passwords, there are thousands of different seeds, each of which is cryptographically secure.

 

So, good luck trying to brute force that.

Link to comment
Share on other sites

Link to post
Share on other sites

Glad I use 25-50 char passwords and randomly change it every 10-30 days. ftw.

 

 

 

Actually I dont change them that often,

COMMUNITY STANDARDS   |   TECH NEWS POSTING GUIDELINES   |   FORUM STAFF

LTT Folding Users Tips, Tricks and FAQ   |   F@H & BOINC Badge Request   |   F@H Contribution    My Rig   |   Project Steamroller

I am a Moderator, but I am fallible. Discuss or debate with me as you will but please do not argue with me as that will get us nowhere.

 

Spoiler

  

 

Character is like a Tree and Reputation like its Shadow. The Shadow is what we think of it; The Tree is the Real thing.  ~ Abraham Lincoln

Reputation is a Lifetime to create but seconds to destroy.

You have enemies? Good. That means you've stood up for something, sometime in your life.  ~ Winston Churchill

Docendo discimus - "to teach is to learn"

 

 CHRISTIAN MEMBER 

 

 
 
 
 
 
 

 

Link to comment
Share on other sites

Link to post
Share on other sites

So how long would it take for my 15 character random passwords to get brute forced?

NEW PC build: Blank Heaven   minimalist white and black PC     Old S340 build log "White Heaven"        The "LIGHTCANON" flashlight build log        Project AntiRoll (prototype)        Custom speaker project

Spoiler

Ryzen 3950X | AMD Vega Frontier Edition | ASUS X570 Pro WS | Corsair Vengeance LPX 64GB | NZXT H500 | Seasonic Prime Fanless TX-700 | Custom loop | Coolermaster SK630 White | Logitech MX Master 2S | Samsung 980 Pro 1TB + 970 Pro 512GB | Samsung 58" 4k TV | Scarlett 2i4 | 2x AT2020

 

Link to comment
Share on other sites

Link to post
Share on other sites

 

On 2/14/2019 at 4:06 PM, lacion said:

 

so if you have a complex save password of 8 characters or less is now time to go and change it everywhere as is no longer save 

 

On 2/14/2019 at 4:10 PM, corrado33 said:

For example: For an 8 character password only including upper and lower case letters (52 characters), that's 52 nPr 8 = 3E13 combinations. Add 10 symbols in there and that's 62 nPr 8 1.3E14 possible combinations.

That's assuming the password is restricted to be 8 characters without special symbols in the first case, and to be exactly 8 characters with or without special symbosl in teh second case. The number of combinations when your password can have different lengths is way, way higher.

 

Something people tend to forget is that brute-forcing a password does not depend on the password, but on the space of admissible passwords (that misconception is how we end up with misconceptions like forcing you to use numbers being a good thing). The particular password you choose is entirely irrelevant, and the time it takes to crack your password is a random variable whose expected value increases in the number of admissible combinations. The latter puts an upper bound on how long it can take, and on average it will take longer the more combinations there are, but you can still be unlucky and have your password guessed at the 2nd attempt. In that regard, "1234" or "password" are as safe as "correct horse staple battery" to brute force: as safe as the number of admissible passwords.

You may say this is wrong, because an algorithm will prioritize "1234" given what we know about people setting passwords. That is correct; however, if you establish such hierarchies then it no longer is brute force strictly speaking, but an algorithm based on a human behavior model.

 

On 2/14/2019 at 4:10 PM, corrado33 said:

Now, make the password 9 characters long and you get 52 nPr 9 1.33E15 possible combinations and 62 nPr 9 = 7.36E15

So a 9 character password that has no special characters is better than an 8 character password with special characters.

Again, an exactly 9 characters is better than an exactly 8 characters password, and a max 9 characters i better than a max 8 characters password system. But choosing an 8 characters password or a 9 characters password when, say, 32 characters are possible, are equally good (that is, unless the system is flawed enough to directly reveal the password's length, at which point they may as well give away the password itself :P)

 

On 2/14/2019 at 4:10 PM, corrado33 said:

 

EDIT: It's also worth noting that using words and sentences, as mentioned in the XKCD may not be entirely safe either. Words can be treated as "units" so instead of saying that a 9 character word is 9 pieces of complexity, it can be treated as 1. A 4 word password can be cracked the same way a 4 character password could with a dictionary attack. (Although words are more secure because there are more of them...)

Eh... No. There are a little more words than characters, since words already are formed by many combinations of characters, so 4 words would never be as bad as 4 characters. And even abstracting from that, using words would not simplify the cracker's task at all unless he already knows the password is made of words, which takes us back to the admissible space issue: forcing people to use actual words decrease the resistance to brute force attacks as it adds constraints, reducing the size of the admissible space. On the other hand, using words in an unconstrained password of max length N is as safe from brute force as not using them.

 

If someone writes an algorithm that starts with all combinations that form words in some language before moving to meaningless combinations, then you would get cracked faster by using words; however, the opposite is true for alternative algorithms than don't look at words (for instance, 1234 is not a word :P). In either case, we would be deviating from brute force strictly speaking, and the conclusion would not be that some type of passwords is better than others, but simply that doing the opposite to what the cracker algorithm does is best - a cat-and-mouse situation.

 

On 2/14/2019 at 4:10 PM, corrado33 said:

 

Best advice: Use a memorable combination of words that's long but also has random symbols sprinkled throughout. E.G. Ca#_1UMP;Ov@r[Mo0NN

Cat Jump Over MooNN, easy to remember, then you just need to remember "pound for t, 1 for J (or just remember it as "lump" and laugh every time), the ";" then "Ovar" with @ and a 0 for the 2nd 'o' and double Ns.

From a brute force point of view, that's as safe as "MyUserIsCorrado33", though.

 

On 2/14/2019 at 4:10 PM, corrado33 said:

EDIT: I played around with this once. Remember the game "Balloons tower defense?" Well I wanted to calculate the order to buy buildings to make the most money in the end-game. So I brute forced every action the player could take in relation to a certain building (the farms). Basically the player could either buy another farm, upgrade existing farms, or sell farms. I let this play out for 40 moves. 

 

When I let the program run.... it eventually came up with a 20 GB text file. Yes, you read that correctly. A 20..... GB.... text file.

I'm not surprised, that's a very inefficient way of finding the solution to an optimization problem :) 

 

Link to comment
Share on other sites

Link to post
Share on other sites

All my passwords are 16 characters, are muh gigabytes still safe?

Link to comment
Share on other sites

Link to post
Share on other sites

23 minutes ago, SpaceGhostC2C said:

From a brute force point of view, that's as safe as "MyUserIsCorrado33", though.

Yep, people are confusing brute force attacks with dictionary attacks.

[Out-of-date] Want to learn how to make your own custom Windows 10 image?

 

Desktop: AMD R9 3900X | ASUS ROG Strix X570-F | Radeon RX 5700 XT | EVGA GTX 1080 SC | 32GB Trident Z Neo 3600MHz | 1TB 970 EVO | 256GB 840 EVO | 960GB Corsair Force LE | EVGA G2 850W | Phanteks P400S

Laptop: Intel M-5Y10c | Intel HD Graphics | 8GB RAM | 250GB Micron SSD | Asus UX305FA

Server 01: Intel Xeon D 1541 | ASRock Rack D1541D4I-2L2T | 32GB Hynix ECC DDR4 | 4x8TB Western Digital HDDs | 32TB Raw 16TB Usable

Server 02: Intel i7 7700K | Gigabye Z170N Gaming5 | 16GB Trident Z 3200MHz

Link to comment
Share on other sites

Link to post
Share on other sites

16 minutes ago, SpaceGhostC2C said:

Again, an exactly 9 characters is better than an exactly 8 characters password, and a max 9 characters i better than a max 8 characters password system. But choosing an 8 characters password or a 9 characters password when, say, 32 characters are possible, are equally good (that is, unless the system is flawed enough to directly reveal the password's length, at which point they may as well give away the password itself :P)

If the brute force algorithm just randomly chooses passwords from the space of permitted passwords, that's true, but that's not a useful assumption.

If the password length is limited to 32 characters, the length of real passwords is not uniformly distributed across the space of permitted passwords. To a first degree approximation, shorter passwords are more common, and when combined with the fact that the search space goes up exponentially a random search doesn't make sense. Trying passwords from shortest to longest is still a brute force attack, but it is more likely to find a password earlier in the search. Under this search scheme, which I would argue is much more likely to be used by someone who really did want to brute force your password without a dictionary, a 9 character password is much more secure than an 8 character password (specifically, 26x if the password is known to be all lowercase letters, with the difference increasing as the alphabet does).

20 minutes ago, SpaceGhostC2C said:

That's assuming the password is restricted to be 8 characters without special symbols in the first case, and to be exactly 8 characters with or without special symbosl in teh second case. The number of combinations when your password can have different lengths is way, way higher.

Assuming an alphanumeric password, there are 628=218340105584896 different 8 character passwords, and 62+622+623+624+625+626+627+628 = 221919451578090 different passwords of up to 8 characters, which is 1.6% more. The difference of including shorter passwords is negligible (but it makes the maths less nice, so it's often omitted from back of the envelope calculations).

HTTP/2 203

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×