TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

How the Bible and YouTube are fueling the next frontier of password cracking

70 点作者 TwoFactor超过 11 年前

10 条评论

bradleyjg超过 11 年前
Ars has now done about a dozen of these articles. Unfortunately I think they are somewhat misleading, in that they don&#x27;t emphasize what exactly the threat is that these password crackers represent.<p>This is an offline attack that allows the attacker to recover the plaintext from hashes. In the context of the internet, the impact of this type of attack on the end-user can be almost entirely mitigated by using unique passwords on each site. A site which has leaked its password hashes is almost certainly already fully compromised, so having the password to that particular site gets the attacker not much. It&#x27;s only when those passwords are reused that recovering the plaintext becomes a big additional win for the attacker.<p>The implications of these articles is that you should use some super complicated random password. Indeed that&#x27;s a good idea. I personally use lastpass to generate long random passwords. But if there&#x27;s a choice between using one really good password all over the internet versus unique, but mediocre passwords on each site, the latter is a better choice. After all any particular site could be a honeypot or store your password in the clear.<p>On the flip side, if these articles are aimed at developers rather than end users, then they should be emphasizing using a modern key derivation function with an appropriate work factor.
评论 #6524570 未加载
nfg超过 11 年前
The link goes to page 3, here&#x27;s page 1: <a href="http://arstechnica.com/security/2013/10/how-the-bible-and-youtube-are-fueling-the-next-frontier-of-password-cracking/" rel="nofollow">http:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2013&#x2F;10&#x2F;how-the-bible-and-yo...</a>
评论 #6521964 未加载
评论 #6522007 未加载
评论 #6523716 未加载
dwaltrip超过 11 年前
I&#x27;m curious what you guys think of my current strategy. I use passwordchart.com. It requires a generator phrase to create a &quot;password chart&quot;, which is simply a mapping from each alphanumeric character to a different 1-3 character alphanumeric string. You then type in an easy to remember password, and it maps that to a far more secure password using the generated chart. I use the same chart (with a backup printed in my wallet), and apply the same methodology for every service I use to create my easy-to-remember password. I read the &quot;how it works&quot; page and it seems pretty secure to me. For all my password needs I only have to remember two things: the generator phrase and the method for making the easy to remember password. There is also little counter party risk (passwordchart.com doesn&#x27;t know where the passwords are used, it would be hard to change the chart without me noticing, and I have a backup). I love not having to think hard when signing up for something new. In 5 seconds, I have an easy to fetch, secure, unique password for any service.
gamegoblin超过 11 年前
I set up an automatic grader for a class I TA so students could submit code and have results immediately (it just pipes input into stdin and checks stdout against a set answer). They had to set up little accounts on my grading website. I told them not to use an important passwords or anything since I am not doing any sort of security. Upon examining the plaintext passwords, there is a decent number (maybe 5 out of 73 students) who used things like &quot;Proverbs22&quot; (number made up) as passwords.<p>Seems like a good strategy to brute force passwords.
评论 #6523845 未加载
notaddicted超过 11 年前
I haven&#x27;t been following cracking development, is anyone aware of a back of the envelope analysis of how much using a preconceived mnemonic reduces entropy versus random letters? I would expect the math has been done, I think all you need are the 1gram counts for the first letter position[1].<p>[1] <a href="https://www.google.com/fusiontables/DataSource?docid=1DlRnW1jLqZrRqVMlII39sJgWM5qH0hki_KcehSY#rows:id=1" rel="nofollow">https:&#x2F;&#x2F;www.google.com&#x2F;fusiontables&#x2F;DataSource?docid=1DlRnW1...</a><p>EDIT: Based on a quick spreadsheet calculation, I think uniform A-Z each letter is 4.7 bits, and a phrase constructed of random english words each letter is 4.1 bits, so maybe not all that bad. <a href="https://docs.google.com/spreadsheet/pub?key=0Ar03cGpoaUJ3dHpZQU1aUS1YSnA4Q2dMQUZIRDc0anc&amp;gid=0" rel="nofollow">https:&#x2F;&#x2F;docs.google.com&#x2F;spreadsheet&#x2F;pub?key=0Ar03cGpoaUJ3dHp...</a>
galapago超过 11 年前
&quot;Why passwords have never been weaker—and crackers have never been stronger,&quot; seems to be tautology..
评论 #6522612 未加载
Sagat超过 11 年前
Does that mean that using a diceware password doesn&#x27;t work?
评论 #6523052 未加载
darklajid超过 11 年前
Is that an actual screenshot? Like, the guy collecting passwords ran a simple script as root, worked as root?<p>How believable is that?
swalkergibson超过 11 年前
This type of dictionary attack is largely mitigated by salting your hashes, is it not?
评论 #6522566 未加载
评论 #6523177 未加载
评论 #6522982 未加载
DerpDerpDerp超过 11 年前
I don&#x27;t know that this is exactly new.