TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Cracking 14 Character Complex Passwords in 5 Seconds

75 pointsby Mikecsiover 14 years ago

14 comments

jfagerover 14 years ago
What stupid linkbait. Cracking LM-hashed passwords is about as interesting as .1 + .2 != .3 in ieee754. Can we at least change the headline to something like "Newsflash: SSDs faster than spinning platters"?
评论 #1850804 未加载
评论 #1850784 未加载
评论 #1851796 未加载
_b8r0over 14 years ago
The rainbow tables are an implementation of a form of time-memory tradeoff attack using a refined hash reduction algorithm based on the work of Martin Hellman (of Diffie-Hellman fame) - <a href="http://en.wikipedia.org/wiki/Rainbow_table" rel="nofollow">http://en.wikipedia.org/wiki/Rainbow_table</a><p>Basically Ophcrack uses optimised hash chains to speed things up. The precomputed hashes are generated with a specific character set. This works particularly well for unsalted algorithms that support limited character sets such as LM. LM splits the password into two on the 7 character boundary, capitalises it and only supports a subset of printable characters. Also it's unsalted, so while more computationally expensive than NTLM it's actually easier to crack. Rainbow tables for LM can be downloaded from freerainbowtables.net and are about 30-40Gb.<p>NTLM on the other hand supports unicode and very long password lengths. Most rainbow tables are mixalpha, or alphanumeric but short length. Our mixalphanum with symbols rainbow table set goes up to 14 characters and is about just under a terabyte. This is more difficult to put on SSDs cheaply.<p>Your best bet to protecting from rainbow tables is to use a character not referenced in commonly available sets in your password as you inevitably otherwise reach the limits of security vs usability with exceptionally long characters. As I use british keyboards, I generally recommend the £ symbol (British pound) or accent over a vowel. The Euro symbol is also good if you're staying in Europe.
评论 #1850704 未加载
评论 #1851379 未加载
nikcubover 14 years ago
With a separate salt for each password the rainbow table becomes useless.<p>If an attacker has both the salt and the hash, they are back to computing the table (brute force)
评论 #1850499 未加载
评论 #1850542 未加载
jackowayedover 14 years ago
If they're really just using 80GB on the SSD (as the linked-to article suggests), why not just use a server with 128GB of RAM and avoid writing to disk altogether?
评论 #1850494 未加载
评论 #1850476 未加载
评论 #1850519 未加载
评论 #1850605 未加载
acqqover 14 years ago
I believe it's not accidental that all passwords that they crack in the demo are 14 characters or less, that can mean that they attack the hashes which are always possible to crack, the speedup they claim is 100 (they simply increased tables from 8 GB to 80 GB and put them on SSD) but e.g. 1000 seconds before was also very fast for somebody who just needed to gain access to one target.
评论 #1850740 未加载
Groxxover 14 years ago
Apparently "cracking" now means "looking up in a big list".
评论 #1850593 未加载
评论 #1850825 未加载
评论 #1850877 未加载
olegkikinover 14 years ago
I call bullshit.<p>Let's say we want to have a rainbow table for all passwords 14 characters long.<p>Let's say we only work with upper and lowercase English characters (26+26) and digits (10), so 62 possible characters.<p>To just store all the possible passwords would take 14 * 62^14 bytes = 1.617 × 10^17 gigabytes.
评论 #1851278 未加载
Smrchyover 14 years ago
Considering that most password are shorter than 14 characters, everyone implementing hashed passwords without a random salt could just store them as plain text. The rainbow table for the most common passwords (names, cities, pet names etc.) would fit in less than 1GB and would probably yield a very high success rate. There's no need to use complex passwords to prove that hashes without proper salting are bound to fail.
cpercivaover 14 years ago
This is what happens when you don't use scrypt.
Jachover 14 years ago
Hmm, I guess I'll just go out to 15 (or 60, safe for a few years) digits of Pi instead of 14...
评论 #1850667 未加载
InclinedPlaneover 14 years ago
Always use a suitably random suitably lengthy per-account salt when hashing passwords.<p>Always.
评论 #1851125 未加载
peterwwillisover 14 years ago
People, NTLM hashes have been dead for years. Stop using them.<p><a href="http://support.microsoft.com/kb/299656" rel="nofollow">http://support.microsoft.com/kb/299656</a>
评论 #1850521 未加载
hackermomover 14 years ago
The details are interesting (although completely obvious), but the article is really stupid, as it assumes everyone uses unsalted passwords and MD5 to create hashes. Duh.
drivebyacct2over 14 years ago
This submission and frankly most of the comments on this HN thread are disturbing. There is a severe lack of understanding of NTLM and the purpose of even hashing, let alone salting, a password... strange.