Topic List |
Page List:
1, 2 |
---|---|
CableZL 05/03/17 3:07:27 PM #1: |
What about password7
Has anyone ever guessed that --- ... Copied to Clipboard!
|
green butter 05/03/17 3:08:13 PM #2: |
in theory wouldn't password1 be a fairly secure pw if someone was just running software that was trying to get every combination of numbers and letters? even moreso if capital letters were considered
--- ... Copied to Clipboard!
|
chill02 05/03/17 3:09:31 PM #3: |
Your password must contain a minimum of 16 characters, 4 numbers, no non consecutive numbers or letters, and can't be similar to one of your previous or anyone else's passwords (we know)
--- Ave, true to Caesar. ... Copied to Clipboard!
|
Rika_Furude 05/03/17 3:10:18 PM #4: |
green butter posted...
in theory wouldn't password1 be a fairly secure pw if someone was just running software that was trying to get every combination of numbers and letters? even moreso if capital letters were considered Nope because 1) its short, 2) its 1 word and 1 number which is trivial to achieve in a dictionary attack and 3) "password7" or any other password like that is dumb dumb dumb --- ... Copied to Clipboard!
|
Verdekal 05/03/17 3:12:13 PM #5: |
Complete_Idi0t topic.
--- Don't tease the octopus, kids! ... Copied to Clipboard!
|
LightHawKnight 05/03/17 3:13:00 PM #6: |
green butter posted...
in theory wouldn't password1 be a fairly secure pw if someone was just running software that was trying to get every combination of numbers and letters? even moreso if capital letters were considered That software will always have the easiest passwords loaded onto it already. --- The Official Odin of the Shin Megami Tensei IV board. "You know how confusing the whole good-evil concept is for me." ... Copied to Clipboard!
|
jenningsnash313 05/03/17 3:13:21 PM #7: |
Rika_Furude posted...
green butter posted...in theory wouldn't password1 be a fairly secure pw if someone was just running software that was trying to get every combination of numbers and letters? even moreso if capital letters were considered I hate people that come into a fun joke topic and take it seriously. --- For all your gaming pleasures: http://www.youtube.com/user/thismikeplaysgames Currently Playing: Majora's Mask, Final Fantasy XIII, Shadow of Mordor ... Copied to Clipboard!
|
NeoShadowhen 05/03/17 3:14:04 PM #8: |
From what I understand, and please correct me if I'm wrong, the methods used to break past passwords really have more difficulty with large numbers of characters as opposed to using goofy combinations of them or strange symbols and numbers. So, a long sentence like "doyoulikeplayinggames" is more secure than "2$ah%W1".
... Copied to Clipboard!
|
Rika_Furude 05/03/17 3:14:33 PM #9: |
Your definition of fun is bizarre
--- ... Copied to Clipboard!
|
RIPVyseCity 05/03/17 3:14:43 PM #10: |
1password is safer
... Copied to Clipboard!
|
Funkdamental 05/03/17 3:15:11 PM #11: |
chill02 posted...
Your password must contain a minimum of 16 characters, 4 numbers, no non consecutive numbers or letters Hold on. Is that saying your letters or numbers must be consecutive? --- Slaughterhouse 5 Cattle 0 ... Copied to Clipboard!
|
chill02 05/03/17 3:16:40 PM #12: |
Funkdamental posted...
chill02 posted...Your password must contain a minimum of 16 characters, 4 numbers, no non consecutive numbers or letters maybe --- Ave, true to Caesar. ... Copied to Clipboard!
|
jenningsnash313 05/03/17 3:17:42 PM #13: |
Rika_Furude posted...
Your definition of fun is bizarre You saying there's something wrong with deriving fun from low quality joke topics on an Internet forum? --- For all your gaming pleasures: http://www.youtube.com/user/thismikeplaysgames Currently Playing: Majora's Mask, Final Fantasy XIII, Shadow of Mordor ... Copied to Clipboard!
|
KeyBlade999 05/03/17 3:19:26 PM #14: |
green butter posted...
in theory wouldn't password1 be a fairly secure pw if someone was just running software that was trying to get every combination of numbers and letters? even moreso if capital letters were considered Let's assume that your password can contain any alphanumeric character on your keyboard plus the symbols - roughly 94 characters. Therefore, each character has 94 possibilities to be. If you brute forced the password up to the 9 character password that is password1, you would have to brute force through all 1-character, 2-character ... 9-character passwords. So in other words, the maximum number of passwords needed to check would be 94 + 94^2 + 94^3 ... + 94^9 = 579,156,036,661,182,474 passwords. Now that seems like a lot, doesn't it? Now, I don't know the standard for this kind of thing, but some quick Googling revealed something about a 25-GPU cluster that can try 350 billion (350,000,000,000) passwords per second. Link - https://arstechnica.com/security/2012/12/25-gpu-cluster-cracks-every-standard-windows-password-in-6-hours/ With our previous number, that is 1,654,731.5 seconds - about 19.2 days nonstop. But then you can make the program even more efficient. Some passwords have limiting characteristics - for example, you might be required to have a special character (that being ! @ # $ % ^ & * ( ) - _ += [ ] \ ; ' , . / { } | : " < > ? I believe) which itself can chop off a lot because that means "oh, hey, I only have to check passwords that have those characteristics." Same thing for requisites of other types, like length, having certain other characters, etc.Plus I imagine an average brute forcing program would be the type to check the Top X (however many X is) used passwords, just in case, right off the bat. --- ''I see now that the circumstances of one's birth are irrelevant. It is what you do with the gift of life that determines who you are.'' - Mewtwo ... Copied to Clipboard!
|
Anteaterking 05/03/17 3:25:39 PM #15: |
NeoShadowhen posted...
From what I understand, and please correct me if I'm wrong, the methods used to break past passwords really have more difficulty with large numbers of characters as opposed to using goofy combinations of them or strange symbols and numbers. So, a long sentence like "doyoulikeplayinggames" is more secure than "2$ah%W1". It all depends on whether someone knows your password scheme. "Do you like playing games" becomes much easier to crack if I'm using a dictionary attack. --- ... Copied to Clipboard!
|
Questionmarktarius 05/03/17 3:34:39 PM #16: |
green butter posted...
in theory wouldn't password1 be a fairly secure pw if someone was just running software that was trying to get every combination of numbers and letters? even moreso if capital letters were considered Incidentally, "passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword" is ridiculously secure. ... Copied to Clipboard!
|
Microwaved_Eggs 05/03/17 3:35:46 PM #17: |
no but password! is
--- No rights reserved. ... Copied to Clipboard!
|
ChromaticAngel 05/03/17 4:09:26 PM #18: |
green butter posted...
in theory wouldn't password1 be a fairly secure pw if someone was just running software that was trying to get every combination of numbers and letters? even moreso if capital letters were considered No, it's not secure because the following. 1. hackers have "hash dictionaries" with many common passwords pre-hashed which they can literally just ctrl+f (not literally) for things like "password1" salt helps, but the attacker likely has access to the salt as well. Remember they don't try to crack your password by repeatedly logging in, they steal the database that contains your hashed password and crack it at millions of attempts per second locally with no restriction. 2. Even if we were to assume that they were attempting to guess every possible combination of letters/numbers/special characters, it's 9 characters long, even if they started at "0" it wouldn't take more than a few days to crack it. 3. If they have access to a previous password in password change schemes, there is a good chance they can guess it outright. A guy whose password is "password7" probably had the password "password6" a few months ago and "password5" before that. password restrictions are tricky because humans will behave in predictable patterns and the more restrictions you impose on someone, the more predictable the pattern will be. An unintuitive bad restriction is a very large minimum length. IF you require a password be at least 20 characters long, there is a good chance that most of your passwords will be exactly 20 characters long. --- ... Copied to Clipboard!
|
ChromaticAngel 05/03/17 4:11:12 PM #19: |
Anteaterking posted...
NeoShadowhen posted...From what I understand, and please correct me if I'm wrong, the methods used to break past passwords really have more difficulty with large numbers of characters as opposed to using goofy combinations of them or strange symbols and numbers. So, a long sentence like "doyoulikeplayinggames" is more secure than "2$ah%W1". while xkcd is correct in that "correcthorsebatterystaple" is more secure than "tr0b4dour&!", "correcthorsebatterystaple" is still not a secure password. --- ... Copied to Clipboard!
|
darkphoenix181 05/03/17 4:13:03 PM #20: |
green butter posted...
in theory wouldn't password1 be a fairly secure pw if someone was just running software that was trying to get every combination of numbers and letters? even moreso if capital letters were considered no because any good hacker program would take the most common passwords and put a number in the front or end of them and that means password[0-9][0-9] is the first thing the program would try on the other hand p1AsswOr3d would be a strong password unless alot of people do this and they specifically code to tray all combinations like this which might be the case --- sigless user is me or am I? ... Copied to Clipboard!
|
EpicMickeyDrew 05/03/17 4:23:33 PM #21: |
jenningsnash313 posted...
Rika_Furude posted...green butter posted...in theory wouldn't password1 be a fairly secure pw if someone was just running software that was trying to get every combination of numbers and letters? even moreso if capital letters were considered I hate people who have nothing worthwhile to add to a topic, and attack those who do. --- Just how, pray tell, does your dick "take life"? How could a dick take a life? - XciteMe ... Copied to Clipboard!
|
iosifsvoboda 05/03/17 4:24:58 PM #22: |
Can we just get on with the eyeball sensor thing so I don't have to make up and remember randomness
--- ^_^ ... Copied to Clipboard!
|
legendarylemur 05/03/17 4:30:19 PM #23: |
EpicMickeyDrew posted...
jenningsnash313 posted...Rika_Furude posted...green butter posted...in theory wouldn't password1 be a fairly secure pw if someone was just running software that was trying to get every combination of numbers and letters? even moreso if capital letters were considered Hear hear. I like serious posts in joke topics personally --- "Iwata was awesome" - Mr. Nintendo dinglebutt ... Copied to Clipboard!
|
COVxy 05/03/17 4:32:12 PM #24: |
Anteaterking posted...
It all depends on whether someone knows your password scheme. "Do you like playing games" becomes much easier to crack if I'm using a dictionary attack. I'm guessing that with any reasonably sized dictionary this would actually be extremely hard to crack still. --- =E[(x-E[x])(y-E[y])] ... Copied to Clipboard!
|
philsov 05/03/17 4:32:23 PM #25: |
Password1! is better. Involves capitals, numbers, and special characters. 10 characters long.
--- Remember that I won't rest, 'til we share the same tense Just know, to me, you're better late than never again. ... Copied to Clipboard!
|
giantblimpN7 05/03/17 4:32:33 PM #26: |
... Copied to Clipboard!
|
darkphoenix181 05/03/17 4:35:42 PM #27: |
philsov posted...
Password1! is better. Involves capitals, numbers, and special characters. 10 characters long. will be one of the first 20 tried combinations --- sigless user is me or am I? ... Copied to Clipboard!
|
Verdekal 05/03/17 5:10:42 PM #28: |
My passwords are all very different, long strains of random letters (some capitalized and some not), numbers and symbols.
--- Don't tease the octopus, kids! ... Copied to Clipboard!
|
fire_bolt 05/03/17 5:28:33 PM #29: |
ChromaticAngel posted...
Anteaterking posted...NeoShadowhen posted...From what I understand, and please correct me if I'm wrong, the methods used to break past passwords really have more difficulty with large numbers of characters as opposed to using goofy combinations of them or strange symbols and numbers. So, a long sentence like "doyoulikeplayinggames" is more secure than "2$ah%W1". On the flip side "correc!horseBattarystap1e" is AMAZINGLY secure --- If her hips don't break, you didn't "carry" hard enough" -SpunkySix ... Copied to Clipboard!
|
Microwaved_Eggs 05/03/17 5:29:08 PM #30: |
fire_bolt posted...
ChromaticAngel posted...Anteaterking posted...NeoShadowhen posted...From what I understand, and please correct me if I'm wrong, the methods used to break past passwords really have more difficulty with large numbers of characters as opposed to using goofy combinations of them or strange symbols and numbers. So, a long sentence like "doyoulikeplayinggames" is more secure than "2$ah%W1". not now that youve posted it here --- No rights reserved. ... Copied to Clipboard!
|
fire_bolt 05/03/17 5:34:56 PM #31: |
Microwaved_Eggs posted...
fire_bolt posted...ChromaticAngel posted...Anteaterking posted...NeoShadowhen posted...From what I understand, and please correct me if I'm wrong, the methods used to break past passwords really have more difficulty with large numbers of characters as opposed to using goofy combinations of them or strange symbols and numbers. So, a long sentence like "doyoulikeplayinggames" is more secure than "2$ah%W1". That was simply a follow up on Chromatic's proof of concept. The idea is that it defeats most standard hard hacks by using a combination of upper and lower case letters, symbols, numbers, long strings, AND misspelled words. No hash dictionary is prepped hardcore enough to deal with that and brute force is gonna have to go thru the entire ASCII set to get each position. --- If her hips don't break, you didn't "carry" hard enough" -SpunkySix ... Copied to Clipboard!
|
Axiom 05/03/17 5:35:46 PM #32: |
Wait it's not. God dammit brb
... Copied to Clipboard!
|
prettyprincess 05/03/17 5:37:37 PM #33: |
don't tell my workplace
--- And in an infinite regress, tell me, why is the pain of birth lighter borne than the pain of death? http://www.last.fm/user/followthegospel ... Copied to Clipboard!
|
Microwaved_Eggs 05/03/17 5:37:43 PM #34: |
Axiom posted...
Wait it's not. God dammit brb are you firebolts alt or something --- No rights reserved. ... Copied to Clipboard!
|
fire_bolt 05/03/17 5:39:18 PM #35: |
Microwaved_Eggs posted...
Axiom posted...Wait it's not. God dammit brb Nah, I thinks he's referring to the topic title. My only alts are all variations on the "bolt" theme --- If her hips don't break, you didn't "carry" hard enough" -SpunkySix ... Copied to Clipboard!
|
Microwaved_Eggs 05/03/17 5:40:08 PM #36: |
fire_bolt posted...
Microwaved_Eggs posted...Axiom posted...Wait it's not. God dammit brb oh i get the joke now --- No rights reserved. ... Copied to Clipboard!
|
jenningsnash313 05/03/17 5:41:48 PM #37: |
EpicMickeyDrew posted...
I hate people who have nothing worthwhile to add to a topic, and attack those who do. But you did exactly what I did, so you added nothing worthwhile except attacking me, which is a bad decision since I am notoriously loved by all. I won't accept what you said as fact unless you admit to hating yourself as well. Checkmate. --- For all your gaming pleasures: http://www.youtube.com/user/thismikeplaysgames Currently Playing: Majora's Mask, Final Fantasy XIII, Shadow of Mordor ... Copied to Clipboard!
|
legendarylemur 05/03/17 5:45:40 PM #38: |
Wow I had to change my password 10 times because of this topic. How are you guys doing this?
--- "Iwata was awesome" - Mr. Nintendo dinglebutt ... Copied to Clipboard!
|
ForestLogic 05/03/17 5:48:23 PM #39: |
jenningsnash313 posted...
Rika_Furude posted...green butter posted...in theory wouldn't password1 be a fairly secure pw if someone was just running software that was trying to get every combination of numbers and letters? even moreso if capital letters were considered This. --- AKA Level 36 ForestWanderer / ObjectiveLogic http://www.poorcouplesfoodguide.com - Pizza Time! ... Copied to Clipboard!
|
Pancake 05/03/17 5:49:14 PM #40: |
i used to use the automated passwords 4chan would give you so you could delete your own posts after the fact; i actually still use a few of them.
eight letters long and they mix numbers and letter cases. hope that's good enough? --- ... Copied to Clipboard!
|
darkphoenix181 05/03/17 6:02:11 PM #41: |
legendarylemur posted...
Wow I had to change my password 10 times because of this topic. How are you guys doing this? not good enough I already hacked your account --- sigless user is me or am I? ... Copied to Clipboard!
|
KainWind 05/03/17 6:06:52 PM #42: |
What if you spell it wrong like passwird1?
--- ... Copied to Clipboard!
|
DarkDragon400 05/03/17 11:44:10 PM #43: |
ChromaticAngel posted...
green butter posted...in theory wouldn't password1 be a fairly secure pw if someone was just running software that was trying to get every combination of numbers and letters? even moreso if capital letters were considered It sounds like you're talking about rainbow tables, where you precalculate hashes and store them so that you don't have to spend time cracking the hashes. But those take a really long time to create and, especially with salts, take up an enormous amount of space. With dictionary attacks, you have a list of possible passwords and you use a program to hash each word in the list and compare it to the hash you're trying to crack. --- ... Copied to Clipboard!
|
Rika_Furude 05/04/17 3:58:24 AM #44: |
ForestLogic posted...
jenningsnash313 posted...Rika_Furude posted...green butter posted...in theory wouldn't password1 be a fairly secure pw if someone was just running software that was trying to get every combination of numbers and letters? even moreso if capital letters were considered Rika_Furude posted... Your definition of fun is bizarre --- ... Copied to Clipboard!
|
Kelystic 05/04/17 4:00:06 AM #45: |
... Copied to Clipboard!
|
GiftedACIII 05/04/17 4:06:41 AM #46: |
Do people still try to brute force passwords in the era where every site makes you use multiple captchas the moment you get your password wrong twice.
--- </topic> ... Copied to Clipboard!
|
Sativa_Rose 05/04/17 4:08:23 AM #47: |
What if it's
420pASSword69 and it's case sensitive? --- I may not go down in history, but I will go down on your sister. ... Copied to Clipboard!
|
Complete_Idi0t 05/04/17 4:11:21 AM #48: |
Fun fact: 63% of passwords on the internet are now correcthorsebatterystaple
... Copied to Clipboard!
|
DarkDragon400 05/04/17 4:11:42 AM #49: |
GiftedACIII posted...
Do people still try to brute force passwords in the era where every site makes you use multiple captchas the moment you get your password wrong twice. It's assumed that we're talking about an instance where the attacker has the hashes. --- ... Copied to Clipboard!
|
apolloooo 05/04/17 4:12:41 AM #50: |
My passwords are based on memes with some variation depending on the website.
So i have 1 constant set of characters that i use in every single of my password, and 1 variables that are different based on the site's characteristics,,name or other thing. --- http://i.imgtc.com/iJyp6bF.png http://i.imgtc.com/ZBw36Qh.png Thanks for the peeps that made the pics <3 if i make typos it means i am on phone ... Copied to Clipboard!
|
Topic List |
Page List:
1, 2 |