hachyderm.io is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hachyderm is a safe space, LGBTQIA+ and BLM, primarily comprised of tech industry professionals world wide. Note that many non-user account types have restrictions - please see our About page.

Administered by:

Server stats:

9.4K
active users

#passwordcracking

0 posts0 participants0 posts today

If you need to sort and dedupe a ton of strings/records, Cynosure Prime member blazer has released rlite, a 'lite' version of rling. I helped debug early versions. A nice balance of performant and simple, but with useful knobs like frequency counting, writing dupes to another file, etc.

(And heavy on the 'performant' - multi-threaded sort + dedupe time for 1.4B records in a 16GB file is 45 seconds on 48 EPYC 7642 cores, and uses 26GB of RAM)

github.com/Cynosureprime/rlite

Password cracking tip:

Grow your ability to understand the math of your attack space.

One nice way to practice this: for a given attack, use Wolfram Alpha (or a calculator, etc.) to roughly confirm the math of your tool's ETA for your attack.

If they don't match, check your assumptions, your setup, or your understanding until they do.

In this example, the total number of guesses scheduled for this attack will take these two GPUs, running at the hashrate shown, a little under 46 days to complete.

wolframalpha.com/input?i=%2814

Practicing this estimation until you can do it very "back of the napkin" / order of magnitude in your head is valuable, just as it is with any "large numbers" effort / industry / exercise.

So ... due to an early obsession with historical BSD hashes ... I have significantly more bcrypt hashrate-per-watt cracking capacity than most solo shops. For bcrypt cost 12, it's about 34Kh/s straight wordlist -- the equivalent of about 17 4090s -- at only 1100W (these old Bitcoin FPGAs are very efficient for bcrypt specifically). And this capacity is intermittently idle, which is kinda a shame.

I haven't really put it out there as something I can help with if needed (outside of the Hashcat team). So ... feel free to ping me if you need bcrypts cracked/audited!

(Reasonable rates, but note that I do have a pretty firmly high bar for provenance / proof of authorization)

(Rat's nest of USB has been cleaned up a bit 😅)

When a target hashlist has a significantly lower percentage of cracks than expected, I've started calling the remaining/missing cracks "dark matter".

Some potential causes of cracking "dark matter":

  • Site changed methodologies later: switched to a nested hash, added a pepper, HSM, true encryption layer, etc.

  • High number of automatically random-ish passwords: defaults, resets, bots, randomized on account lock, etc.

  • Complexity requirements higher than expected: high minimum length, etc.

  • Attacker (me) is missing key info: language, encoding, demographics, etc.

What could other causes be?

One example why to use strong #passwords for users who use file sharing over #SMB even when the file transfers are #encrypted.
If the SMB traffic is captured/eavesdropped, then the attacker can try to crack the user password.
The attacker is able to extract challenge/response values from the Session Setup and then use #passwordcracking tools such as #hashcat

If the attack is successful, the attacker will gain not only the access to the user account, but it is also possible to decrypt the captured SMB file transfers. There is lack of perfect forward secrecy in this encryption.

For more details and practical examples, see this blog post:

malwarelab.eu/posts/tryhackme-

No, NCSC¹, passphrases of only three (or even four) random words are not sufficient - unless the user knows that the password hashing method is a "slow" one (bad for the attacker). Which is rarely guaranteed.

1025 combinations -- six words from a pool of 20K words, or five words from a pool of 100K words -- should be considered the minimum.

¹ncsc.gov.uk/collection/top-tip

#Passphrases
#PasswordCracking

:boosts_welcome:
I bought these cool little NXP - NTAG213 "business cards" from the clearance section at Walmart. They're branded as "popl PhoneCard". They have a hard coded hyperlink to popl.com with some tracking data to link it to an account that you have to access with a sketchy app. They're password locked so I can't rewrite them. I looked it up & found "74657329" in hex or "tes)" in ASCII to be the password, but neither of these work for these cards & the posts I found are all old. I don't have the equipment to sniff a password from the app, if it even does that which I doubt. Is there a way to crack NFC card passwords from an Android phone?
#NFC #PasswordCracking #ntag213

So @solardiz presented a talk on "Password cracking: past, present, future" at OffensiveCon last week. Definitely worth a read - bringing his usual disciplined thinking to a topic he knows very well.

He includes both historical and taxonomical perspectives, both of which I appreciate. Apparently, one of the first password-cracking contests was in 1982? (This was a password cracker contest - seeking the best cracking software!)

openwall.com/presentations/Off

[Will update post if video of the talk itself appears.]

#passwords #hashing
#PasswordCracking

www.openwall.comPassword cracking: past, present, future (OffensiveCon 2024)

Prompted by a recent conversation, a short, living list of password-length breakpoints relative to hashes, in bytes (will shorten with a CW after it stabilizes):

7 - Max length of the first and second halves of an LM password. This means that any ASCII LM password, regardless of length and composition, can be cracked in under five minutes on modern gear.

8 - Max length of a descrypt password. If ASCII, can be fully exhausted on prosumer gear in a couple of days (worst case)

8 - WPA2 minimum length

8 - Minimum length of some Ethereum passphrases

8 - Max length of AS/400 and older iSeries mainframe passwords

10 - Max length of newer iSeries mainframe passwords (if QPWDMAXLEN is configured)

14 - Max "length" of an LM password (even though it's really two 7-byte passwords)

14 - Max value for the native minimum password length policy setting in Windows (unless third party passfilt.dll or fine-grained rules are used)

15 - Length at which LM password default will be ignored, and the hash will be forced to be NTLM (except some machine-account corner cases, which may truncate to 14)

63-64 - Max length of WPA2 (depending on implementation)

72 - Max length of a bcrypt password

128 - Max length for newer IBM mainframes when configured

What am I missing? (Will merge any validated replies)

Note: chars != bytes, lots of corner cases, YMMV.

Scope note - too many website length restrictions / symptoms to list here, but github.com/apple/password-mana is a great place for that!

GitHubGitHub - apple/password-manager-resources: A place for creators and users of password managers to collaborate on resources to make password management better.A place for creators and users of password managers to collaborate on resources to make password management better. - apple/password-manager-resources