![]() |
Hackers crack 16-character passwords in less than an HOUR
This is pretty disturbing
During an experiment for Ars Technica hackers managed to crack 90% of 16,449 hashed passwords. Six passwords were cracked each minute including 16-character versions such as 'qeadzcwrsfxv1331' A 25-computer cluster that can cracks passwords by making 350 billion guesses per second. It was unveiled in December by Jeremi Gosney, the founder and CEO of Stricture Consulting Group. It can try every possible Windows passcode in the typical enterprise in less than six hours to get plain-text passwords from lists of hashed passwords. The article http://www.dailymail.co.uk/sciencete...ords-hour.html |
350 billion guesses per second... :helpme
|
I heard the safest passwords were four word combos with dashes (??) and would take forever to crack
example: take-fish-dirt-reed example: sdfk-fjsd-weij-akji |
Wow that's a lot of GPU power.
|
damn they're coming along nicely
|
most systems have brute force prevention in place to prevent this sort of stuff. But if they came in using a bot net you would be in trouble until you caught it.
|
Quote:
|
but this will work to unpack and unprotect files, to access your NET accounts, he can't do it via bruteforce, server and program will just take it down...
|
Quote:
1. You have x4 dictionary words 2. Just putting 4 dashes in aint gonna fool no-one. I think site owners really need to make their sites secure against multiple login attempts rather than getting us to remember 5%6Yy*5$fdd1$8>KKhJo)o or some such shit. |
Quote:
Beside as longest you have some sort of bruteforce protection things like this dont mean much. |
|
Quote:
Include numbers, special characters and uppercase/lowercase. Like this: 71#Testpassword |
surrentlysober is pretty safe with Icunta4rdapassw0rd
|
great server if it allows you 3.5 billion tries a second.
|
Quote:
|
Quote:
|
Quote:
|
Quote:
|
Quote:
|
I don't use a password, just leave it blank they can guess all they want they'll never solve it!!
|
Did any of you guys actually read the article? correcthorsebatterystaple is a little harder to crack, but not impossible. They use custom dictionaries that brute force multiple WORDS as well as multiple characters.
|
Because only retards use md5. If it was SHA512 we'd never see this article ;)
|
Quote:
|
if your system is open to brute force then you pretty much deserve what happens...
|
Quote:
|
Quote:
|
Quote:
QFT :thumbsup |
Quote:
|
I've started using password as my password, I figure it's so common nobody would code a cracker to waste testing it.
|
ok thanx 4 the stress :)
|
I use 'wrong' as password so when I don't type it properly site tell me: your password is wrong
|
Quote:
|
Quote:
Quote:
|
Quote:
Anyway, md5 is so 1990, not even sure who hashes with md5 anymore. |
Just buy a cheap server. A billion request will crash the motherfucker.
:1orglaugh |
All times are GMT -7. The time now is 02:52 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123