I find passwords really hard to remember. Especially those sites that
require numbers, symbols,uppercase, and lower case characters. I personally
would rather use a 20 character all lowercase
password<http://preshing.com/20110811/xkcd-password-generator/>than an
8 character mixed symbol password. As a result keep a document, in
the cloud, with all of my passwords stored in plain text. Many of these
passwords I could care less if someone cracked.
Also, I was under the impression that salting prevents the use of rainbow
tables <https://www.freerainbowtables.com/>.

Cody Smith


On Mon, Nov 18, 2013 at 11:28 AM, Parks, Raymond <rcpa...@sandia.gov> wrote:

> WRT password cracking - Dan Goodin has a good series of articles on
> password cracking at Ars Technica.
>
> http://arstechnica.com/security/2013/03/how-i-became-a-password-cracker/
>
> http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/
>
> http://arstechnica.com/security/2013/10/how-the-bible-and-youtube-are-fueling-the-next-frontier-of-password-cracking/
>
> TL;DR - Current GPU-based password cracking using 20-million word
> dictionaries make truly random passwords below 14 characters and nearl all
> pass-phrases susceptible to cracking in a relatively short time.
>
> On a related subject, roughly 75% of websites store passwords as nothing
> more complicated than simple, unsalted MD5 hashes.  This is almost as easy
> to break as as NTLM.
>
> Salt makes the initial crack more difficult, but if the same salt is used
> for all hashes, then subsequent cracks ignore it.
>
> WRT the use of PII - it's sold on various markets, correlated in a "big
> data" manner with other exposures, and, if enough information is available
> and the person's credit score is high enough, is used for credit attacks.
>  In some cases, if banking information is correlated, the collection is
> used for banking attacks.  If there is poor correlation but an email or
> FQDN is in the information, then the data may be used as a target list.
>
> Ray Parks
> Consilient Heuristician/IDART Program Manager
> V: 505-844-4024  M: 505-238-9359  P: 505-951-6084
> NIPR: rcpa...@sandia.gov
> SIPR: rcpar...@sandia.doe.sgov.gov (send NIPR reminder)
> JWICS: dopa...@doe.ic.gov (send NIPR reminder)
>
>
>
> On Nov 18, 2013, at 10:12 AM, Owen Densmore wrote:
>
> A forum I belong to has been hacked, including personal info as well as
> passwords.
>
> How do they use this information?
>
> I presume they try the hash function on all combinations of possible
> passwords.  (Naturally optimized for faster convergence).  They see a
> match, i.e. a letter combination resulting in the given hash of the
> password.
>
> If they crack one password, does that make cracking the rest any easier?
>
> And does "salt" simply increase the difficulty, and indeed can it be
> deduced, as above, by cracking a single password?
>
> .. or is it all quite different from this!
>
>    -- Owen
>  ============================================================
> FRIAM Applied Complexity Group listserv
> Meets Fridays 9a-11:30 at cafe at St. John's College
> to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com
>
>
>
> ============================================================
> FRIAM Applied Complexity Group listserv
> Meets Fridays 9a-11:30 at cafe at St. John's College
> to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com
>
============================================================
FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

Reply via email to