![]() |
Originally Posted by glob99
(Post 26069450)
Sites are dumb if they allow brute force attacks. It's easy to allow only 3 attempts and then block further attempts for 5 minutes. Then a billion attempts would take over 3000 years!
Sophisticated hackers are like good burglars and robbers. If they get your credit card information, they may not directly use your credit card but instead use the information they obtain to open another account that you're not aware you have--until you get the first month's bill for $10,000. |
This doesn't resolve OP question but for everyone else, recommend enabling two tier authorization whenever available. In theory, the only way to access/login, even if pw cracked is to steal your phone.
|
Originally Posted by glob99
(Post 26069450)
Sites are dumb if they allow brute force attacks. It's easy to allow only 3 attempts and then block further attempts for 5 minutes. Then a billion attempts would take over 3000 years!
There are various levels there, but the speed of brute-force lookup you can do on a file of password hashes exceeds the theoretical network rates -- it's not simply a matter of slowing things down, even a site with no blocking mechanism is going to only be able to do a few tens of thousands of login attempts per second on a single account, and as you say, adding some kind of throttling and lockout is pretty easy. By contrast, if you've got the file locally, you can try depending on the example, up to nearly a trillion and a half possible passwords per second. The encryption type matters a lot, though -- the best algorithms are about 1,000 times slower to test per http://hashcat.net/oclhashcat/ and there are other techniques that can slow down the test rate by a roughly equal amount. That's still at least a million tests per second locally, something that's virtually impossible against any kind of individual public network endpoint unless you've got an entire botnet at your disposal (and maybe not then -- and a million failed logins in that time frame are going to register on someone's console even at a site like Facebook or Google.) |
the only protection is being inconvenienced and building VERY large passwords with mixed characters, and the only way to manage this is with Keepass or Lastpass and with a long passphrase and make sure you don't have malware on your computer such as keyloggers.
Two tier authorization is nice for some apps, but for Google I tried it and it was so onerous that I had to turn it off. |
Originally Posted by glob99
(Post 26069450)
Sites are dumb if they allow brute force attacks. It's easy to allow only 3 attempts and then block further attempts for 5 minutes. Then a billion attempts would take over 3000 years!
|
> GRC Password Haystacks ...
The tools that estimate password strength are ... crap. According to one popular password strength meter, BandGeek2014 should take 74+ centuries to crack; another estimated six [6] years. Big spread, eh? Reality: Hashcat cracked it in less than 90 minutes. |
Originally Posted by gqZJzU4vusf0Z2,$d7
(Post 26071153)
> GRC Password Haystacks ...
The tools that estimate password strength are ... crap. According to one popular password strength meter, BandGeek2014 should take 74+ centuries to crack; another estimated six [6] years. Big spread, eh? Reality: Hashcat cracked it in less than 90 minutes. ... and how does it know it has cracked it, if it reads gibberish on every iteration? |
Originally Posted by richard
(Post 26070093)
Two tier authorization is nice for some apps, but for Google I tried it and it was so onerous that I had to turn it off.
Other sites I use include amazon, eBay, PayPal, iCloud. POV ;) |
Originally Posted by antichef
(Post 26071198)
... and how does it know it has cracked it, if it reads gibberish on every iteration?
You have a hash (examples here) and try different passwords until you generate the matching hash value. Of course, you need a dump of passwords first. |
Originally Posted by jspira
(Post 26060117)
If we want to really improve security, we would get rid of passwords and use something more secure such as biometrics.
Remember what Henry Ford is supposed to have said: "If I had asked people what they wanted, they would have said faster horses." Biometric passcode locks are not all that difficult to circumvent, even as it would tend to localize the password circumvention at first. For example, there are people who have used their sleeping/hung-over roommates' fingers to access the data of phones that get unlocked by a fingerprint. And there have been examples of people using photos -- even of fingerprints -- to access devices locked with biometric passcode. |
Originally Posted by nkedel
(Post 26071845)
Cracking passwords, in that sense, works backwards.
You have a hash (examples here) and try different passwords until you generate the matching hash value. Of course, you need a dump of passwords first. Since we are really talking about an offline brute force cracking it presumably means that length and mixed character types are the only thing that will take time and slow up the attacker? Hence my query about 20 letters, so that !1234567890.Abcdefgh Is a magnitude smaller than !1234567890.Abcdefghi and therefore much less secure? I am really trying to gauge how long it will hold back the attacker so that changes could be made if the hack became public! |
How long?
It depends on many factors: Length Randomness/entropy Hashing algorithm System salt User salt Whenever hashing passwords, it is imperative to choose an algorithm that is resistant to hardware acceleration. Fast hashing algorithms that are insecure: MD5, SHA1 Fast hashing algorithms that are secure, but should not be used for passwords: SHA2, because it is easily accelerated. Slow hashing, secure algorithms that are resistant to hardware acceleration: bcrypt, scrypt or PBKDF2 MANY sysadmins are epic failures when it comes to getting these matters precisely correct. |
That is helpful to me too, but stretching my subject knowledge now!
Does that mean that even if I choose a 20 digit multi character password all this can be affected and degraded by the way that the website operator chooses to encrypt the password before they store it? Some methods being harder than others to crack? |
Originally Posted by antichef
(Post 26072773)
That is helpful to me too, but stretching my subject knowledge now!
Does that mean that even if I choose a 20 digit multi character password all this can be affected and degraded by the way that the website operator chooses to encrypt the password before they store it? Some methods being harder than others to crack? |
Originally Posted by gqZJzU4vusf0Z2,$d7
(Post 26071130)
You misunderstand how passwords are cracked. Professionals crack passwords off-line, not on-line.
|
| All times are GMT -6. The time now is 1:33 pm. |
This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.