TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Cracking encrypted LastPass vaults

181 pointsby markutaover 2 years ago

17 comments

gchadwickover 2 years ago
&gt;I downloaded the popular rockyou.txt wordlist and put my actual vault master plaintext password inside<p>I was hoping for an exploration of how quickly one might crack a lastpass vault looking at different strength passwords and different iteration counts.<p>Instead the author has simply demonstrated that if you tell the cracking tool your password it can indeed crack it...<p>I guess you can at least follow what they did with your own vault without adding your password to the word list and see if it cracks quickly or not.
评论 #34126073 未加载
评论 #34129216 未加载
评论 #34126129 未加载
bedatadrivenover 2 years ago
&gt; I downloaded the popular rockyou.txt wordlist and put my actual vault master plaintext password inside<p>Note that is NOT a demonstration of being able to crack an encrypted LastPass vault. The author&#x27;s exercise wouldn&#x27;t be feasible without prior knowledge of the master password, or choosing a master password that is present in a list of common passwords. That is consist with what we have heard from LastPass so far.
评论 #34126061 未加载
shrxover 2 years ago
Reminder to never use pixellation to obfuscate sensitive data: <a href="https:&#x2F;&#x2F;github.com&#x2F;bishopfox&#x2F;unredacter">https:&#x2F;&#x2F;github.com&#x2F;bishopfox&#x2F;unredacter</a>
评论 #34126274 未加载
评论 #34128773 未加载
评论 #34129666 未加载
评论 #34127015 未加载
评论 #34126665 未加载
xvectorover 2 years ago
Good tutorial. This is why I prefer 1Password, as it requires the secret key to be compromised in addition to the Master Password, thus providing protection against a weak master password.<p>I&#x27;ve always thought it foolish to recommend solutions like LastPass and BitWarden, which don&#x27;t require a secret key. It is dangerous design, prioritizing ease of onboarding over actual security.<p>The average consumer <i>needs</i> an autogenerated secret key. It provides entropy where the user will refuse to. Everyone I have helped set up a LastPass or Bitwarden account have chosen simple passwords, and are extremely resistant to the point of <i>anger</i> if you make them choose a complex one. After a few weeks, my mother changed her complex password back to a simple one behind my back - the only time she&#x27;s learnt computer functionality on her own.<p>1Password&#x27;s whitepaper, IMO, also shows that it&#x27;s ahead of the game in general.<p>I wasn&#x27;t surprised when LastPass was hacked - indeed, I&#x27;ve been expecting it for years - poor software quality and bad security choices were the red flags. Hopefully this forces BitWarden and LastPass to change and introduce generated secret keys in their account creation phase.
评论 #34125888 未加载
评论 #34126534 未加载
评论 #34129475 未加载
评论 #34126026 未加载
评论 #34126070 未加载
gillesjacobsover 2 years ago
A bit disingenuous to not discuss the strength of his master password, but a good demonstration for some who still trust LastPass&#x27;s very disingenuous communication.
评论 #34125893 未加载
_rmover 2 years ago
&gt; otherwise it would take 6 hours+ to crack<p>Ok, can you run it for 7 hours without your password in the list and let us know?
评论 #34127457 未加载
评论 #34126344 未加载
RheingoldRiverover 2 years ago
So, if my lastpass master password is actually secure (~30 characters and contains capital, lowercase, symbols, and a long string of randomly-generated numbers that I memorized as part of it, and no part of this is reused anywhere else), do I have to worry? It does seem like a good idea to switch, but do I have to switch <i>urgently</i>?
评论 #34125911 未加载
评论 #34128460 未加载
upofadownover 2 years ago
This is an obvious demonstration, but I think still an important one. Lastpass has said this about the breach:<p>&gt; These encrypted fields remain secured with 256-bit AES encryption and can only be decrypted with a unique encryption key derived from each user’s master password using our Zero Knowledge architecture.<p>That all sounds great but the number of bits of AES and the cool &quot;Zero Knowledge&quot; designation is completely irrelevant here. It entirely depends on the strength of the user supplied password. So if your password is weak you are in trouble. The other message here is that if your password was installed before 2019 it is probably going to be a lot easier for an attacker to guess.<p>That&#x27;s it, that&#x27;s the whole thing, but it still needs to be shown...
lvncelotover 2 years ago
&gt; I downloaded the popular rockyou.txt wordlist and put my actual vault master plaintext password inside (using a quarter of the wordlist), otherwise it would take 6 hours+ to crack.<p>I don&#x27;t believe the 6 hours+ claim. (Or rather, the &quot;+&quot; is doing some serious lifting in that sentence.)<p>Looking at the password, it&#x27;s of the correct-horse-battery-staple variety, which could be conservatively estimated at 44 bits of entropy (this is even ignoring the additional number appended to a random word) - which would take even the described &quot;multi-gpu&quot; setup with 2 million hashes a second just about 100 days to exhaust (or 50 days to have a 50% chance of getting it), let alone the 1000 hashes a second macbook the author was using.
评论 #34127493 未加载
perihelionsover 2 years ago
- <i>&quot; Attackers on the other hand can leverage multi-GPU device setups with optimised drivers that could easily reach speeds of 2,000,000+ H&#x2F;s.&quot;</i><p>Why wasn&#x27;t LastPass using memory-hard key derivation functions? I thought that&#x27;s been best practice for a very long time now: we&#x27;ve known about GPU&#x2F;ASIC hashing for decades.
评论 #34128128 未加载
hsbauauvhabzbover 2 years ago
I vaguely remember recovering a LastPass vault with email confirmation in ~2015, that would be a glaring security hole so maybe my memory is wrong, can anyone confirm that I’m totally wrong and that LastPass don’t have a back door into all accounts?
iinnPPover 2 years ago
Does anyone have a good source on brute force and what is and isn&#x27;t a good idea? I came across the below in a rather important website and am wondering if I should push harder for the to change it.<p>How secure is a randomized 5 digit pin where you get unlimited guesses but after 10 guesses the pin is reset?<p>Guessing the pin correctly gets you enough information to open a bank account.<p>Assuming a system like the above exists, would you consider it a security vulnerability?
评论 #34126145 未加载
评论 #34126172 未加载
EMM_386over 2 years ago
Yes, I too cracked most of my university&#x27;s passwords on a UNIX system using a dictionary and a tool in 1995.<p>There really isn&#x27;t anything new here.
评论 #34129565 未加载
albertopvover 2 years ago
I hoped for something else in the end of the article. I use a local only password manager with automatically long (generally speaking, some stupid services limit password length to ridiculous short value) random generated passwords, which I don&#x27;t know myself, it still seems to me to be best approach.
sinuhe69over 2 years ago
There is always a potentially critical vulnerability in any centralized password storage. Especially, if it requires a (relatively) simple master password to access. A many factors system like the one of Apple is IMO more secure but also easier to remember because they are all pin&#x2F;passwords one needs (almost) every day.
评论 #34127748 未加载
paulpauperover 2 years ago
So how was the other guy&#x27;s account cracked? <a href="https:&#x2F;&#x2F;twitter.com&#x2F;cryptopathic&#x2F;status&#x2F;1606416137771782151" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;cryptopathic&#x2F;status&#x2F;1606416137771782151</a><p>this should not be possible to bruteforce
alin23over 2 years ago
Looks like the XKCD way of generating passwords is not as secure. After all, it decreases entropy by a whole lot if 30 characters can be dumbed down to 5 English words with dashes&#x2F;spaces&#x2F;periods between.<p>So it’s kind of like using 5 characters from a much larger alphabet (the English dictionary) instead of 30 from a 26 letter alphabet.
评论 #34125970 未加载
评论 #34125950 未加载
评论 #34126117 未加载
评论 #34126317 未加载
评论 #34127820 未加载