blueghost, to security
@blueghost@mastodon.online avatar

Hive Systems has published their 2024 password table.

The table illustrates the maximum time required to brute force a password based on various lengths and complexities.

Brute force: https://en.wikipedia.org/wiki/Brute-force_attack

Website: https://www.hivesystems.com/password-table
Blog: https://www.hivesystems.com/blog/are-your-passwords-in-the-green

#HiveSystems #Password #BruteForce #PasswordTable #Security #InfoSec #Data #DataProtection #CyberSecurity #PasswordManager #Cracking #Privacy

itnewsbot, to random

Beating Bitlocker in 43 seconds - How long does it take to steal your Bitlocker keys? Try 43 seconds, using less tha... - https://hackaday.com/2024/02/06/beating-bitlocker-in-43-seconds/

cdarwin, to random
@cdarwin@c.im avatar

Unlike protocols that require a neutral third party to complete (arbitrated), or protocols that require that neutral third party to resolve disputes (adjudicated), 🔸self-enforcing protocols🔸 just work.

Cut-and-choose works because neither side can cheat. And while the math can get really complicated, the idea generalizes to multiple people.

Well, someone just solved gerrymandering in this way.
Prior solutions required either a bipartisan commission to create fair voting districts (arbitrated), or require a judge to approve district boundaries (adjudicated), their solution is self-enforcing.

And it’s trivial to explain:
• One party defines a map of equal-population contiguous districts.
• Then, the second party combines pairs of contiguous districts to create the final map.

It’s not obvious that this solution works. You could imagine that all the districts are defined so that one party has a slight majority. In that case, no combination of pairs will make that map fair.

But real-world is never that clean. There’s “,” where a party’s voters are split amongst several districts to dilute its power; and “,” where a party’s voters are concentrated in a single district so its influence can be minimized elsewhere.

It turns out that this “define-combine procedure” works; the combining party can undo any damage that the defining party does—that the results are fair.
The paper has all the details, and they’re fascinating.
Of course, a theoretical solution is not a political solution. But it’s really neat to have a theoretical solution.

https://www.schneier.com/blog/archives/2024/02/a-self-enforcing-protocol-to-solve-gerrymandering.html

Celrunia_QT, to femboy
@Celrunia_QT@net4sw.com avatar
harrysintonen, (edited ) to retrocomputing

Most has heard of : Removing or bypassing software . But how does one crack a game? @h0ffman shows the process in this pair of VODs of twitch streams. The catch? He’s cracking 30 year old games using period accurate gear and tools:

• Floppy disks only
• Action Replay MKIII

Part 1: https://youtu.be/yqz2IqqFf6Q?t=290
Part 2: https://youtu.be/cyDaAA_vMOs?t=280

harrysintonen, (edited ) to retrocomputing

Some quality content from @h0ffman on twitch: Rob Northen copylock protection live using and Action Replay III

Viss, to random
@Viss@mastodon.social avatar

it's been a while since i did .

as i understand it the new hotness is prince processing and combining words versus just straight randomization.

is there a guide out there somewhere to try this new hotness?

cuz cracking slow hashes that are 10+ chars long is uh..
not the best.

gmate8, to Cybersecurity
blacktraffic, to random

@epixoip - I seem to remember you saying rainbow tables are obsolete. If so, presumably because with a decent gpu you can blitz through all the 8-9 char NTLM passwords faster than reading anything off disk these days?

epixoip,

.@blacktraffic Great question!

Here are some reasons why are obsolete for :

In any given password database, 92-98% of the passwords are going to be created by highly predictable humans (as opposed to being randomly generated.) Because of this, modern password cracking is heavily optimized for exploiting the human element of password creation, concentrating on probabilistc methods that achieve the largest plaintext yield in the least amount of time. As such, modern password cracking tools and techniques have evolved to become highly dynamic, requiring agility, flexibility, and scalability.

This is evident when looking at how has evolved over the last decade. Hashcat used to be heavily optimized for raw speed, but today it is optimized for maximum flexibilty (plus, lite, and cpu merged into a single code base, dropped the 15-character limit, introduced pure kernels, brain, and slow candidate mode, etc.) This need for dynamicity is also why we largely still use GPUs today, rather than having moved on to devices with potentially higher throughput, such as FPGAs or even ASICs.

With this in mind, it's rather easy to see that rainbow tables are the antithesis of modern password cracking. Rainbow tables are static, rigid, and not at all scalable. They directly compete with unordered incremental brute force, which in the context of modern password cracking, is largely viewed a last resort and generally only useful for finding randonly-generated passwords (although, can also be useful in identifying new patterns that rules and hybrid attacks failed to crack.) They also do not scale. If you have a handful of hashes, rainbow tables will likely be faster than brute forcing on GPU. But if you are working with even a modestly large hash set, rainbow tables will be slower than just performing brute force on GPU, even if you are using GPU rainbow tables.

Overall, rainbow tables are an optimization for an edge case: cracking a small amount of hashes of an algorithm for which we have tables, within the length and character sets for which we have tables, that fall within that 2-8% of hashes that we cannot crack with probabilistic methods. And even then, most people who are conscious enough to use use random passwords aren't going to make them only 8 or 9 characters long, so the percentage of those passwords that will actually be found in your tables will be much lower.

The questions you have to ask yourself: is that worth the disk space and the bandwidth to download and store rainbow tables, and do you really care about that 2-8%, keeping in mind that only a small percentage of that is going to fall within the tables you have? If the answer is "yes", then continue to use rainbow tables. However, the for the vast majority of us, the answer for the past 11 years has been a resounding "no." And that's why rainbow tables are, by and large, a relic of a bygone era.

With that said, rainbow tables do still have some utility outside of . For instance, cracking DES or A5/1 . There's also the cousin of rainbow tables, lossy hash tables (LHTs), which have some utility as well for things like old Microsoft Office and Adobe Acrobat encryption keys.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • tacticalgear
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • lostlight
  • All magazines