How breakable is your password?

How breakable is your password?

Author
Discussion

eliot

11,445 posts

255 months

Friday 26th April
quotequote all
admin password for well known organisation i did work for was ‘jam’ - it was like that for many years

Skodapondy

295 posts

49 months

Friday 26th April
quotequote all
You can stop that right now, asking for my password. I'm not falling for that, unless you really are a Nigerian Prince with banking issues. Then I might lend it you.

Actual

758 posts

107 months

Friday 26th April
quotequote all
I have never forgotten "********"

bigpriest

1,606 posts

131 months

Friday 26th April
quotequote all
In that original example why are key presses treated differently depending on the output being alphabetic, numeric or symbol? A key is a key.

Mr Pointy

11,250 posts

160 months

Friday 26th April
quotequote all
bigpriest said:
In that original example why are key presses treated differently depending on the output being alphabetic, numeric or symbol? A key is a key.
Adding numbers and/or symbols hugely increases the number of possible passwords to check - if you know you only have to try letters it's much quicker.

Scabutz

7,647 posts

81 months

Friday 26th April
quotequote all
eliot said:
admin password for well known organisation i did work for was ‘jam’ - it was like that for many years
I worked for a massive tech company. The company originally was known by a TLA. The database user used by the main application had its username as this TLA and the password was the same.

Plus it had god level privileges. There was so much tech debt though that no one dared trying to change it.

BlueMR2

8,657 posts

203 months

Friday 26th April
quotequote all
otolith said:
Those presumably are times for brute force cracking a stolen hash on fast equipment. You obviously can't brute force the front door of a system in that manner.
The picture states 12 x RTX 4090, so not cheap but not out of the budget for many.

Actual

758 posts

107 months

Friday 26th April
quotequote all
For years the default database administrator account and password for Microsoft SQL Server was sa and 'blank'

The easiest way to connect another system to the database or to setup a scheduled job was to use sa and 'blank'

I expect that in some place that still exists.

Halmyre

11,219 posts

140 months

Friday 26th April
quotequote all
I remember doing a Novell Netware training course many years ago, upgrading from one version to another. The lecturer was telling us about a potential security hole (undocumented) when doing the upgrade. He said that when he gave the course to an unnamed government department, when he mentioned the 'hole', about half the class umped out of their seats, pulled out their mobile phones, and ran out of the room speaking urgently to the person on the other end.

21TonyK

11,546 posts

210 months

Friday 26th April
quotequote all
Novell... theres a memory. Still got an original set on 5.25 floppys somewhere.

21TonyK

11,546 posts

210 months

Friday 26th April
quotequote all
eliot said:
admin password for well known organisation i did work for was ‘jam’ - it was like that for many years
Yep, international bilion dollar company had the same admin password on all servers which was known by pretty much everyone in IT across maybe 40-50 sites.

This was the same for at least 3 years when I contracted for them.



Mr Whippy

29,075 posts

242 months

Friday 26th April
quotequote all
BlueMR2 said:
otolith said:
Those presumably are times for brute force cracking a stolen hash on fast equipment. You obviously can't brute force the front door of a system in that manner.
The picture states 12 x RTX 4090, so not cheap but not out of the budget for many.
This will all become a bit of a non issue with encryption on chip I’d hope, as hashes will be encrypted and never stored in ram etc in the clear.

Given any front end will be limited to a try a minute after say 5 wrong attempts, for instance, the risks of ste passwords should fall off quite a bit.


And I’d hope server side stuff will go encrypted soon enough.

All that being said, I’m surprised hashes are even stored unencrypted.
Ie, can’t they be loaded to ram then unencrypted… then surely accessing hashes from ram becomes many times harder?!
Or are these servers that get attacked literally under full control?



It does all seem like a circular issue in that end users aren’t particularly vulnerable except via re-using passwords, and that’s a thing because of too many passwords, and that’s a thing because of too many ducking accounts!

eliot

11,445 posts

255 months

Friday 26th April
quotequote all
Scabutz said:
eliot said:
admin password for well known organisation i did work for was ‘jam’ - it was like that for many years
I worked for a massive tech company. The company originally was known by a TLA. The database user used by the main application had its username as this TLA and the password was the same.

Plus it had god level privileges. There was so much tech debt though that no one dared trying to change it.
did they have a hand or foot in horizon by any chance ….

otolith

56,230 posts

205 months

Friday 26th April
quotequote all
Mr Whippy said:
Or are these servers that get attacked literally under full control?
The scenario they’ve modelled is where the database of hashes has been stolen and they’re brute forcing them on their own tin. You could reversibly encrypt the hashes, but that’s just putting another hurdle in the way, not definitely solving the problem.

Mr Whippy said:
It does all seem like a circular issue in that end users aren’t particularly vulnerable except via re-using passwords, and that’s a thing because of too many passwords, and that’s a thing because of too many ducking accounts!
Yep.

the-norseman

12,464 posts

172 months

Saturday 27th April
quotequote all
164m years according to the graph.

bitchstewie

51,449 posts

211 months

Saturday 27th April
quotequote all
Realistically the biggest threat most people face is they'll re-use passwords or they won't use MFA.

If you do one thing to improve your online security make sure your email account is using a strong unique password and enable MFA on your email account and use Gmail or Outlook.com.

If you do the above nobody is getting into either of those any time soon.

Rick101

6,970 posts

151 months

Saturday 27th April
quotequote all
I though mine would be instant but I'm more secure than I thought. Password1 I salute you.

Scabutz

7,647 posts

81 months

Saturday 27th April
quotequote all
bhstewie said:
Realistically the biggest threat most people face is they'll re-use passwords or they won't use MFA.

If you do one thing to improve your online security make sure your email account is using a strong unique password and enable MFA on your email account and use Gmail or Outlook.com.

If you do the above nobody is getting into either of those any time soon.
Very good advice. Primary email is so important yo have properly secured. If anyone gets into that they can pretty much get into any of your other accounts then.

I use a password manager and have a complex unique password and MFA. If you login to your office account in security you can see the login attempts and there are multiple attempts a day from other people trying it on. Probably with leaked creds from another site. They not getting in.

bitchstewie

51,449 posts

211 months

Saturday 27th April
quotequote all
Quite.

It won't happen to them or it's too much hassle to go through all their accounts or they don't trust a password manager or (shocker!) decent password managers cost money blah blah blah.

Or everyone you know and everything you use has your ntlworld email address you still use with POP3 and it's too much trouble to change it everywhere.

I get it.

But ask yourself just how much someone could fk up your real life if they had access to the email that gets sent every single time you see a "forgot password" option on a website or service you use scratchchin

Hereward

4,193 posts

231 months

Saturday 27th April
quotequote all
Rick101 said:
I though mine would be instant but I'm more secure than I thought. Password1 I salute you.
Careful now. Maybe time to upgrade to "Password1!"