Password Strength

lxskllr

No Lifer
Nov 30, 2004
57,985
8,222
126
I'm curious about password strength, especially as it relates to dictionary attacks. If this were used as a password(taken from a cereal box) "raspberrygingercrisplowfatcereal". Would it be considered strong? Rank it on a 1-10 scale with 1 being simple, and 10 being impossible, and for amateur, and professional crackers. Example...

Amateur 9
Professional 5
 

lxskllr

No Lifer
Nov 30, 2004
57,985
8,222
126
Originally posted by: snikt
According to M$, "raspberrygingercrisplowfatcereal" is considered weak.

Password strength

I'd be curious to know how that would get attacked. I don't know much about encryption, but it seems like a fairly random grouping of words, with unknown individual length. In addition to that, I thought it was all or nothing, not like "raspberry**************fat******"
 

alpha88

Senior member
Dec 29, 2000
877
0
76
I make up a non-sense phrase and then permutate the characters, add a few symbols

For example:

"I Like Dirt"

to

"eyelikedirt"

to

"3y3l1k3d1rt"

to

"#y#l!k#d!rt"

 

wonSR4

Member
Feb 17, 2009
34
0
0
Hmm, just used a current password of mine, and got strong . Added in some random stuff to get it to best, but way too many characters to be a password for me.
 

blackangst1

Lifer
Feb 23, 2005
22,902
2,359
126
For my truecrypt password I have a 15 character, 4 word phrase, with a few 3's instead of e, 0 instead of o, etc, plus every other letter I insert a character next to the previous letter so its not dictionary words. For example I like green eggs becomes i12ikl34Gfr34eneghgsa. Sounds complicated, but its a system I created years ago so its second nature to me now.
 

lxskllr

No Lifer
Nov 30, 2004
57,985
8,222
126
I'm having a hard time believing MS's password checker. It says this is weak "raspberrygingercrisplowfatcereal", but this is best strength "raspberrygingercrisplowfatcereal#1"
 

seepy83

Platinum Member
Nov 12, 2003
2,132
3
71
Originally posted by: lxskllr
I'm having a hard time believing MS's password checker. It says this is weak "raspberrygingercrisplowfatcereal", but this is best strength "raspberrygingercrisplowfatcereal#1"

That's because you have added other types of characters to the password.

The most recent recommendations that I have gotten from the security industry has been the following characteristics:
-At least 15 Characters long
-Is a passphrase, not password
-Contains all of the following: Uppercase, Lowercase, Numbers, and Punctuation
-Is not based on personal information (i.e. family names, birthdates, etc)
-Should be easily remembered
-Should be realatively easy to type so that you're not "Hunting and Pecking" to find the right characters on the keyboard (so no one can watch you type it)
 

lxskllr

No Lifer
Nov 30, 2004
57,985
8,222
126
Originally posted by: seepy83
Originally posted by: lxskllr
I'm having a hard time believing MS's password checker. It says this is weak "raspberrygingercrisplowfatcereal", but this is best strength "raspberrygingercrisplowfatcereal#1"

That's because you have added other types of characters to the password.

The most recent recommendations that I have gotten from the security industry has been the following characteristics:
-At least 15 Characters long
-Is a passphrase, not password
-Contains all of the following: Uppercase, Lowercase, Numbers, and Punctuation
-Is not based on personal information (i.e. family names, birthdates, etc)
-Should be easily remembered
-Should be realatively easy to type so that you're not "Hunting and Pecking" to find the right characters on the keyboard (so no one can watch you type it)

But is the last one really that much harder to crack than the first?
 

compman25

Diamond Member
Jan 12, 2006
3,767
2
81
Originally posted by: lxskllr
Originally posted by: seepy83
Originally posted by: lxskllr
I'm having a hard time believing MS's password checker. It says this is weak "raspberrygingercrisplowfatcereal", but this is best strength "raspberrygingercrisplowfatcereal#1"

That's because you have added other types of characters to the password.

The most recent recommendations that I have gotten from the security industry has been the following characteristics:
-At least 15 Characters long
-Is a passphrase, not password
-Contains all of the following: Uppercase, Lowercase, Numbers, and Punctuation
-Is not based on personal information (i.e. family names, birthdates, etc)
-Should be easily remembered
-Should be realatively easy to type so that you're not "Hunting and Pecking" to find the right characters on the keyboard (so no one can watch you type it)

But is the last one really that much harder to crack than the first?

For MS it is.
 

Chiefcrowe

Diamond Member
Sep 15, 2008
5,044
184
116
The addition of a different character type exponentially increases the time needed to implement a brute force attack to guess the password, so yes it is harder to crack.
 

Crusty

Lifer
Sep 30, 2001
12,684
2
81
Originally posted by: lxskllr
Originally posted by: seepy83
Originally posted by: lxskllr
I'm having a hard time believing MS's password checker. It says this is weak "raspberrygingercrisplowfatcereal", but this is best strength "raspberrygingercrisplowfatcereal#1"

That's because you have added other types of characters to the password.

The most recent recommendations that I have gotten from the security industry has been the following characteristics:
-At least 15 Characters long
-Is a passphrase, not password
-Contains all of the following: Uppercase, Lowercase, Numbers, and Punctuation
-Is not based on personal information (i.e. family names, birthdates, etc)
-Should be easily remembered
-Should be realatively easy to type so that you're not "Hunting and Pecking" to find the right characters on the keyboard (so no one can watch you type it)

But is the last one really that much harder to crack than the first?

By adding that extra character you've now added a whole extra set of characters to the list of possible choices thus making any brute force method take a much much longer time to guess it.

Obviously brute forcing isn't the most optimal solution, but in combination with a dictionary to try out various common phrases/words it's easy to find passwords that aren't complex at all. I'm talking stuff like 'love45' or 'Password'.
 

lxskllr

No Lifer
Nov 30, 2004
57,985
8,222
126
Originally posted by: Crusty

By adding that extra character you've now added a whole extra set of characters to the list of possible choices thus making any brute force method take a much much longer time to guess it.

Obviously brute forcing isn't the most optimal solution, but in combination with a dictionary to try out various common phrases/words it's easy to find passwords that aren't complex at all. I'm talking stuff like 'love45' or 'Password'.

I guess this question really isn't suitable for a enthusiast web forum. Anything beyond a basic answer I imagine requires in depth study. I can understand the adding of variables increasing complexity, but I would think the improbable group of words in my sample password would rate higher than a "weak".
 

seepy83

Platinum Member
Nov 12, 2003
2,132
3
71
Originally posted by: lxskllr
Originally posted by: Crusty

By adding that extra character you've now added a whole extra set of characters to the list of possible choices thus making any brute force method take a much much longer time to guess it.

Obviously brute forcing isn't the most optimal solution, but in combination with a dictionary to try out various common phrases/words it's easy to find passwords that aren't complex at all. I'm talking stuff like 'love45' or 'Password'.

I guess this question really isn't suitable for a enthusiast web forum. Anything beyond a basic answer I imagine requires in depth study. I can understand the adding of variables increasing complexity, but I would think the improbable group of words in my sample password would rate higher than a "weak".

The thing is that they're all dictionary words and don't even use both Upper and Lower Case. The Info Sec Industry says that makes it easy to crack. I'll stick with the best practices recommended by the Industry until someone can prove otherwise, and get the Industry to change their recommendations.
 

lxskllr

No Lifer
Nov 30, 2004
57,985
8,222
126
Originally posted by: seepy83


The thing is that they're all dictionary words and don't even use both Upper and Lower Case. The Info Sec Industry says that makes it easy to crack. I'll stick with the best practices recommended by the Industry until someone can prove otherwise, and get the Industry to change their recommendations.

Yea, but it isn't a common phrase or anything. I could see "truelove" being easy to crack. Those two words go together, and it's only 2 words. "raspberrygingercrisplowfatcereal", really? I don't know much about brute forcing passwords, but I imagine it uses probability to go through common words and phrases before starting on the improbable. Also, you don't get partial credit for some of the words. It's all or nothing. I find it hard to believe that the above password gets the same rating as "password".
 

shiranai

Member
May 9, 2005
81
0
0
You're not thinking about this correctly; it's a question of total number of possible combinations. A ten-character password that uses only lowercase letters has 26^10 (1.4*10^14) combinations; adding just numerical digits raises that to 36^10 (3.7*10^15), an entire order of magnitude difference. Further including uppercase letters, non-alphanumeric characters, etc. has even greater effects.

Combinations of randomly chosen dictionary words are poor password choices because they limit the number of possibilities. For a given string length, there are (far) fewer combinations of words than there are of letters; this should be intuitively obvious, as the set of all words is a subset of the set of all random character combinations.
 

mechBgon

Super Moderator<br>Elite Member
Oct 31, 1999
30,699
1
0
You can also complexificate things by using ALT characters. For example, hold down the ALT key and type 0153 on the numeric keypad, then release ALT. Oh look, a ? symbol :evil: Granted, not so simple for you laptop users...

The idea is that it further complicates a brute-force attack. If the attacker is simply using the usual character set (upper, lower, numerals and the usual punctuation symbols on the keyboard), your password will be untouchable. If they decide to include every possible ALT character, a brute-force attack will take unimaginably longer.
 

nitromullet

Diamond Member
Jan 7, 2004
9,031
36
91
Originally posted by: mechBgon
You can also complexificate things by using ALT characters. For example, hold down the ALT key and type 0153 on the numeric keypad, then release ALT. Oh look, a ? symbol :evil: Granted, not so simple for you laptop users...

The idea is that it further complicates a brute-force attack. If the attacker is simply using the usual character set (upper, lower, numerals and the usual punctuation symbols on the keyboard), your password will be untouchable. If they decide to include every possible ALT character, a brute-force attack will take unimaginably longer.

Interesting concept from a security perspective, but it doesn't seem like it could be applicable everywhere. I just tried to type ? on a shell I have open on a FreeBSD machine I'm connected to via PuTTY, and it didn't register as anything.
 

lxskllr

No Lifer
Nov 30, 2004
57,985
8,222
126
Originally posted by: nitromullet
Originally posted by: mechBgon
You can also complexificate things by using ALT characters. For example, hold down the ALT key and type 0153 on the numeric keypad, then release ALT. Oh look, a ? symbol :evil: Granted, not so simple for you laptop users...

The idea is that it further complicates a brute-force attack. If the attacker is simply using the usual character set (upper, lower, numerals and the usual punctuation symbols on the keyboard), your password will be untouchable. If they decide to include every possible ALT character, a brute-force attack will take unimaginably longer.

Interesting concept from a security perspective, but it doesn't seem like it could be applicable everywhere. I just tried to type ? on a shell I have open on a FreeBSD machine I'm connected to via PuTTY, and it didn't register as anything.

AFAIK the special symbols are only available that way in Windows. I have a couple I use on a regular basis, and I always pull up the character map in Linux. There may be shortcuts, but I haven't taken the time to look as of yet.
 

Scouzer

Lifer
Jun 3, 2001
10,358
5
0
I always wonder what crappy sites are still vulnerable to brute forcing. I thought everyone has 5 or 10 try lockouts now adays, especially websites that actually matter, like banking.
 

RebateMonger

Elite Member
Dec 24, 2005
11,586
0
0
It's amazing how many sites are STILL only allowing up to seven characters and no special characters. Many of those sites are banks. And don't even get me on those special "Security" questions. Ask Sarah Palin how secure those are.

As far as Windows passwords, LONG (16-plus character) passphrases with at least one mis-spelled word or other abnormality are good enough for me. All of my machines will lock out about ten billion times before those are guessed by a brute-force or dictionary attack.

While maybe not optimal, the people who get broken into are those using Security questions or common, short, passwords. Those are VERY common, even as Administrator accounts on servers. There's no reason to waste time on ten billion brute-force attempts when so many PCs, servers, and email and bank accounts have easy-to-guess passwords. Email accounts are great, since most contain emailed passwords and account information, and many folks don't consider them important enough to protect with strong passwords.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |