Author Topic: How secure is your password?  (Read 10770 times)

Enter Password would take 511 years to crack.

it does not  forget
you can only see it because it's your password



Sure just click a link on a forum, letting them know where you came from via referral, then enter your password.  What could go wrong.  You guys are geniuses. 

The site is assuming that the password is allowed to be input infinite times, most will lock you out of the site/username after around 3 tries or such

The site is assuming that the password is allowed to be input infinite times, most will lock you out of the site/username after around 3 tries or such
lol does that actually work against password crackers?

lol does that actually work against password crackers?

If the site was badly made you could probably just refresh your cookies/IP and give it another shot, and that automated would add close to no time onto the easily crackable, but I've had alot of times where failing the password completely stops the username from being accessable, and sends an email to you that allows you to try again/report or asks for the security questions.

Now theres the problem that if the crackers got into your email first the entire thing fails, and Im pretty sure there was a case that some kids got into someones bank account from working their way through his profiles

lol does that actually work against password crackers?
Password crackers usually work by having a local copy of the user/password database on your computer, so no.

If the site was badly made you could probably just refresh your cookies/IP and give it another shot, and that automated would add close to no time onto the easily crackable, but I've had alot of times where failing the password completely stops the username from being accessable, and sends an email to you that allows you to try again/report or asks for the security questions.

Now theres the problem that if the crackers got into your email first the entire thing fails, and Im pretty sure there was a case that some kids got into someones bank account from working their way through his profiles
If they have your email and do this, they're morons. Just use "Reset Password" and bam!

It would take a desktop PC about
88 quadrillion nonagintillion years
to crack your password

Get loving rekt bitches

Password crackers usually work by having a local copy of the user/password database on your computer, so no.

Huh? Where do you think people are going to get that? Password crackers normally (poorly) function over HTTP and use multithreading to submit a form thread count / (response time in seconds) per second. Plus, if they had a local copy of the database, you'd assume that the passwords are already hashed otherwise they could just query the DB for the password. In which case, you need to know the salt that the passwords were hashed with. You may be able to brute force something that causes a hash collision but there's no guarantee that it's the 'right' entry depending on how they salted it.

lol does that actually work against password crackers?

Websites that refuse to let you continue usually function on one (or more) of three lockouts: session (cookie) based, account based, and computer based.

The benefit of session based lockouts are that it only locks out the person trying to guess the password. These are really effective against friends typing your birthday, dog's name, mother's maiden name, etc 4 times and getting locked out. Then, they can't do anything (without sufficient technical knowledge) for 10 minutes where they can guess another 4. However, you are completely unaffected by this and can log in your house without getting a mysterious 'Account is locked. Try again in 7 minutes.' message.

The benefit of account based lockouts are that they are essentially impossible to circumnavigate. It doesn't matter where you are in the world, what computer you're on, or how many times you just guessed a password to a different account, once you've used up those guesses you have to wait the lockout. These are inconvenient for hackers AND people, since it's really a full account lockout. You can switch to your phone and try, but you'll be locked out there too. There's also the potential of getting a mysterious 'Account is locked. Try again in x minutes.' message if someone else is trying to break into your account.

The benefit of computer based locks are that they are slightly stronger than session based locks. They're like temporary IP bans. The issue is that IP isn't really a good way to identify a person on a home network. However, this type of lockout will persist through cookie resets, browser changes, computer restarts, and even usually router resets. So, it's kind of like getting the benefits of an account based lockout and the benefits of a session based lockout. However, it is still not as strong as an account based lockout.

However, the point is probably moot. This tool assumes that you are brute forcing a password on your local computer loaded into RAM. That's probably about 15 CPU cycles per guess (assuming a simple algorithm) which means a 2.5GHz processor would be making ~150 million guesses per second. Comparatively, someone making guesses to Facebook running 12 threads at a 400ms response time would be making 30 guesses per second.
« Last Edit: March 12, 2016, 10:45:32 AM by $trinick »

Along with the fact you probably got that from xkcd, xkcd also proves such passwords are actually very secure. Unless, perhaps, you do a dictionary attack or something.


Randall Munroe is not exactly a password management expert.  But sure, let's say people do that.

The overwhelming majority of people's words are going to fall into a top 1000 words or so.  So most people will have a password from a pool of roughly 10004 possible passwords.  Now let's compare that against a secure password - 64 characters, random ASCII.  That's 9364 possible passwords.

CHBS-style password:
1000000000000 possibilities
Secure password:
961410160206664622086998474872525329540550991672782179554222730174333739159409986394206895176171912560363787697067327321683201 possibilities


Huh.  It's almost like you shouldn't take advice from a webcartoonist too literally, and should instead go get an actual password manager.

Huh.  It's almost like you shouldn't take advice from a webcartoonist too literally, and should instead go get an actual password manager.

I'm not sure you understand what the image said to do OR understand the point of the comic.

Let's start out with the obvious: nobody loving uses password managers. Maybe you do, maybe the other techies you know do, and maybe people paranoid about privacy do. But, for the overwhelming majority of the population, people are not going to install another program onto their computer to make it harder for them to get into their own accounts. It's a loving stupid concept unless they're trying to go for the utmost privacy.

That being said, people (in general) strive to have as secure of passwords as they can without inconveniencing themselves. These people are sick of being told to somehow memorize a different base64 string for each of their passwords, because they feel like it's too much work to do that, and writing down a complex password is probably less secure than your average 8 character password. So, Randall Munroe points out the obvious: as wrong as the string itself has similar complexity to a complex password, it will be similarly difficult to crack. For example, even a password as simple as L@te@N!te is similarly difficult to crack as ?uTZ+by37. You might point out that "late at night" is more susceptible to dictionary + character substitution attacks, but that would be an unwise choice for someone to run on ANY password because it's going to take marginally less time than a full on brute force attack AND it can't possibly guarantee that the password will be in the result set of their guessing function. So, you get the complexity of a generated password with the ability to remember it in your own head. Sounds pretty good to me.

So, you get the complexity of a generated password with the ability to remember it in your own head.


Whoops!  Wrong.  Unless you're reusing passwords, in which case one plaintext breach completely screws you regardless of how secure your password is.


Whoops!  Wrong.  Unless you're reusing passwords, in which case one plaintext breach completely screws you regardless of how secure your password is.

Continue your pontification. How am I wrong?

Did you even read the linked article?