Preview

Password Cracking

Good Essays
Open Document
Open Document
794 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Password Cracking
Password cracking has matured in the past few years. New hardware and techniques has made it possible to attempt 8.2 billion password combinations per second. This is being done by leveraging the GPU (Graphics Processing Unit) of the computer, complex algorithms and a new twist on an old technique called rainbow tables. In a rainbow table the password is passed through a complex mathematical formula that expresses all possible password combinations without requiring each combination to be stored on disk. From cryptographer Kestas Kuliukas: “A rainbow table chain starts with an arbitrary plaintext, hashes it, reduces the hash to another plaintext, hashes the new plaintext, and so on. The table stores only the starting plaintext and the final hash, and so a chain "containing" millions of hashes can be represented with only a single starting plaintext, and a single finishing hash.”
The efficiency of rainbow table is remarkable. It would take 3,108 terabytes of disk space to store all the possible combinations of a 10 character password. A rainbow table consisting of 99.9% of the same password combinations only consumes 167 gigabytes.
Password cracking tools are widely available and sometimes from reputable companies.
AccessData is commonly known for digital forensics and litigation support tools. However, they also offer a product PRTK (Password Recover Toolkit) which can decrypt passwords of many common applications. Alternatively, Ophcrack is a community supported free password cracking tool is able to decrypt 99% of Windows operating system passwords. Both of these tools are targeted at law enforcement or security professionals; however there is nothing to stop the malicious use of these tools.
With the rising advancements in password cracking what is an acceptable password policy?
Most IT security professionals will recommend beginning with enforcing complex password. Complexity can vary. In the simplest form a complex password is mixed case,



References: Dinei Florencio and Cormac Herley; Microsoft Research. (2007). A Large-Scale Study of Web Password Habits. Retrieved from: https://research.microsoft.com/pubs/74164/www2007.pdf Dan Goodin. (Aug 2012). Why passwords have never been weaker – and crackers have never been stronger. Retrieved from: http://arstechnica.com/security/2012/08/passwords-underassault/4/ SANS (n.d.). Password Policy. Retrieved from: http://www.sans.org/securityresources/policies/Password_Policy.pdf Password Safe. (n.d.). Retrieved from: http://passwordsafe.sourceforge.net/ 1Password. (n.d.). Retrieved from: https://agilebits.com/onepassword

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Simplicity of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    21.) What do you call an attempted hacking, where every possible every possible combination is used?…

    • 641 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Easiness of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    In this Hi-Tech era, there is a great demand to identify and authenticate the individuals. Till now we are totally dependent upon Passwords and Pin Numbers for identification. How secure are passwords? With the numerous passwords that an individual has to remember, they are often forgotten,…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    password sniffer, data extractor, ransom hijacker, and so much more) on the user’s computer (keeping in…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Lab Answers

    • 617 Words
    • 3 Pages

    3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity?…

    • 617 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    This process includes the creation of a strong password and an account lockout policy is created, logon hours are assigned, a ticket expiration policy is created, and clock synchronization tolerance to prevent replay attacks is set just to name…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    8. Which password attack exploits situations where users change their passwords by adding a number to their old password?…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Study Guide

    • 508 Words
    • 3 Pages

    password is used to generate a key for the one-way function and in which a…

    • 508 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays

Related Topics