{"id":1299,"date":"2014-10-13T10:17:31","date_gmt":"2014-10-13T10:17:31","guid":{"rendered":"http:\/\/www.uktech.co.uk\/blog\/?p=1299"},"modified":"2014-10-13T11:35:24","modified_gmt":"2014-10-13T11:35:24","slug":"how-to-crack-passwords","status":"publish","type":"post","link":"https:\/\/www.uktech.co.uk\/blog\/2014\/10\/how-to-crack-passwords\/","title":{"rendered":"How to Crack Passwords!"},"content":{"rendered":"<h4 style=\"text-align: center;\">Or\u00a0why you should stop using them&#8230;<\/h4>\n<p><a href=\"http:\/\/www.uktech.co.uk\/blog\/wp-content\/uploads\/2014\/08\/locks-350x200.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"pic aligncenter wp-image-1327 size-medium\" src=\"http:\/\/www.uktech.co.uk\/blog\/wp-content\/uploads\/2014\/08\/locks-350x200-300x171.jpg\" alt=\"locks 350x200\" width=\"300\" height=\"171\" srcset=\"https:\/\/www.uktech.co.uk\/blog\/wp-content\/uploads\/2014\/08\/locks-350x200-300x171.jpg 300w, https:\/\/www.uktech.co.uk\/blog\/wp-content\/uploads\/2014\/08\/locks-350x200-1024x585.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Ok.<\/p>\n<p>I admit &#8211; I lied.<\/p>\n<p>I&#8217;m not going to tell you how to crack passwords &#8211; I do have scruples!<\/p>\n<p>But you should stop using them\u00a0&#8211; read on of you want to know why.<\/p>\n<p><!--more--><\/p>\n<h4>How it used to be<\/h4>\n<p>To skip the history, pitfalls and examples &#8211; go straight to\u00a0creating better pass phrases that are easy to remember <a href=\"#passphrase\">click here.<\/a><\/p>\n<p>In the old days working as a system administrator, the current thinking, went along the lines that you should use characters from a lot of different symbol sets &#8211; A-Z, 0-9, :@~{}* etc. and should have a minimum of 8 characters.<\/p>\n<p>This would make the password very hard to guess.<\/p>\n<blockquote><p>It also made it very hard to remember.<\/p><\/blockquote>\n<p>Admins had a novel way to deal with this issue &#8211; they would either write them down &#8211; or more often, use the same password for everything!<\/p>\n<p>You could say this wasn&#8217;t &#8216;ideal&#8217;&#8230;<\/p>\n<blockquote><p>But then, no one had determined what the threat actually was&#8230;<\/p><\/blockquote>\n<p>In those days, businesses rarely thought about the most <em><strong>likely<\/strong> <strong>form<\/strong> <\/em>of\u00a0attack &#8211; they thought one solution would be good enough for every situation. Regularly, they would enforce monthly or quarterly password changes &#8211; for all staff &#8211; just in case one or two had been compromised.<\/p>\n<blockquote><p>This had appalling consequences.<\/p><\/blockquote>\n<p>Staff would just add a 1,2,3,4 etc. to the end of their short,&#8217;strong&#8217;, passwords, every time they were forced to change. Then the sys admins caught up with this practice and set further rules &#8211; to stop people using passwords too similar to ones used previously.<\/p>\n<blockquote><p>Does this sound like your companies policy?<\/p><\/blockquote>\n<h4>Why this is wrong<\/h4>\n<p>People make all sorts of assumptions about what is or isn&#8217;t a strong password, with no real understanding of how passwords are cracked.<\/p>\n<p>The first thing to<em><strong><span style=\"text-decoration: underline;\"> really<\/span> understand<\/strong><\/em> is this:<\/p>\n<blockquote><p>The criminal does not know <em><strong>anything<\/strong> <\/em>about your password.<\/p><\/blockquote>\n<p>As long as this statement is true &#8211; i.e. you haven&#8217;t told anyone, or written your password on a Post-It note stuck to your monitor, then the criminal does not know whether your password is your dogs name, the number of your house, has 4 letters or is in French.<\/p>\n<p>What this means to the criminal, is that they have to cover <em><strong>all bases:<\/strong><\/em>\u00a0for example, certain password cracking &#8216;tools&#8217;, don&#8217;t work on passwords over 8 characters. But if you don&#8217;t know the length of the password, you might use one of these tools &#8211; wasting possibly days of work to discover that you need to try something else.<\/p>\n<p>If your password was &#8220;rover&#8221;, it would be trivial to crack this &#8211; even just being friendly enough to find out your dog is called rover would do.<\/p>\n<p>However, if your password was &#8220;rover jumps logs&#8221; it would now be 16 characters long and even though it&#8217;s all lower case &#8211; <em><strong>the criminal does not know this<\/strong><\/em>.<\/p>\n<p>Once you force the criminal to start password cracking without any snippet of information about the password, it is another\u00a0order of magnitude to crack.<\/p>\n<h4>Real World Example<\/h4>\n<p>On the internet, there are <em><strong>many<\/strong><\/em> questions like &#8220;How long would it take to crack a 10 digit password?&#8221; and &#8220;Should I use upper and lower case letters as well as numbers?&#8221;<\/p>\n<p>There is no point to questions like these &#8211; the <em><strong>whole<\/strong> <\/em>point about strong passwords is denying the criminal <em><strong>any<\/strong> <\/em>knowledge about them.<\/p>\n<p>If a criminal discovered that your password was 10 characters long, he would be at a <em><strong>huge<\/strong> <\/em>advantage &#8211; because he can now concentrate his efforts, tweaking software tools for 10 characters or less. This knowledge <em><strong>significantly<\/strong> <\/em>reduces the time it would take to crack the password.<\/p>\n<blockquote><p>If he knows nothing, he has to start from scratch and try <em><strong>everything.<\/strong><\/em><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<p>Business (well actually, everyone), should understand what the threat actually <em><strong>is<\/strong><\/em>. Everyone knows <em><strong>what<\/strong> <\/em>it is they are trying to protect, but few understand what <em><strong>from<\/strong><\/em>.<\/p>\n<p>There really are only a couple\u00a0types of attack on your computer &#8211; whether at a business or at home:<\/p>\n<ol>\n<li>Casual &#8216;drive by&#8217; attacks.<\/li>\n<li>Prolonged, well organised attacks by determined individuals or government agencies.<\/li>\n<\/ol>\n<p>The only thing that is going to protect you from the second type of attack, is sophisticated encryption <em><strong>and<\/strong> <\/em>a solid understanding of how to implement it. Even then, once physical access has been gained, all bets are off.<\/p>\n<p>The primary type of attack , therefore, comes from theft (for money &#8211; by selling your computer), or from your\u00a0colleagues at work and even your friends and family (not necessarily malicious &#8211; e.g. the kids just accidentally deleted your year end report).<\/p>\n<p>So, to defeat a colleague from gaining access to your computer, almost any &#8216;good&#8217; password will do &#8211; because they will not get access to your machine, for long enough to crack it.<\/p>\n<p><a name=\"passphrase\"><\/a><\/p>\n<h5 style=\"color: #2d2d2d;\">How to create strong passphrases<\/h5>\n<blockquote style=\"color: #02aeec;\"><p>Stop using passwords!<\/p><\/blockquote>\n<p>Without going into technical detail, don&#8217;t use pass<strong style=\"font-style: inherit; color: #333333;\">words<\/strong>!<\/p>\n<p>Use pass<strong style=\"font-style: inherit; color: #333333;\">phrases<\/strong>\u00a0instead &#8211; they are the easiest, strongest &#8216;passwords&#8217; to remember especially &#8211; if used with a\u00a0<strong style=\"font-style: inherit; color: #333333;\">&#8216;padding&#8217;<\/strong>.<\/p>\n<p>Here are some typical passwords &#8211; do you want to try and remember them?:<\/p>\n<ul class=\"bullets\" style=\"color: #363636;\">\n<li style=\"font-weight: inherit; font-style: inherit;\">Hiudyfg^%^}<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">qwL*&#8221;ideR<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">#:co*\/!*12<\/li>\n<\/ul>\n<p>However, a passphrase is just a sequence of words and is much easier to remember:<\/p>\n<ul class=\"bullets\" style=\"color: #363636;\">\n<li style=\"font-weight: inherit; font-style: inherit;\">passphrasesaregreatforthememory<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">quickorangebacongarden<\/li>\n<li style=\"font-weight: inherit; font-style: inherit;\">greatbeaglebookcase<\/li>\n<\/ul>\n<p>The simple idea is that passphrases are\u00a0<strong style=\"font-style: inherit; color: #333333;\">much<\/strong>\u00a0easier to remember, longer and therefore relatively secure.<\/p>\n<h5 style=\"color: #2d2d2d;\">The Padding Trick<\/h5>\n<p>When used with a &#8216;padding&#8217; &#8211; a symbol &#8216;block&#8217; you attach to your passphrases &#8211; e.g. the characters &#8220;@6\/&#8221; &#8211;\u00a0<strong style=\"font-style: inherit; color: #333333;\">which always stays the same<\/strong>\u00a0&#8211; the passphase becomes\u00a0<strong style=\"font-style: inherit; color: #333333;\">dramatically stronger<\/strong>.<\/p>\n<p>So, if you combine easy to remember passphrases with a padding, using our last example you would get:<\/p>\n<p>&#8220;greatbeaglebookcase@6\/&#8221; or &#8220;quickorangebacongarden@6\/&#8221;<\/p>\n<p>This allows you to create &#8216;passwords&#8217; that are complex and long, whilst being reasonably memorable. Even better, you can always write the passphrases down and keep them in your wallet. If you lose the wallet, no one is going to know the padding, so can&#8217;t use the passphrase.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Or\u00a0why you should stop using them&#8230; Ok. I admit &#8211; I lied. I&#8217;m not going to tell you how to crack passwords &#8211; I do have scruples! But you should stop using them\u00a0&#8211; read on of you want to know why.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,83,79,7],"tags":[],"class_list":["post-1299","post","type-post","status-publish","format-standard","hentry","category-daily-tech","category-facebook","category-global","category-security"],"_links":{"self":[{"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1299"}],"version-history":[{"count":26,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1299\/revisions"}],"predecessor-version":[{"id":1355,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1299\/revisions\/1355"}],"wp:attachment":[{"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}