Page 56 - Cyber Defense eMagazine - October 2017
P. 56

Burger&fries                                     64,000 years



               Burger&fries1                                    26,000,000 years


               Burger123fries                                   98,000,000 years




               The estimates shown assume a sequential, pure brute-force attack. But that is not how
               an  attacker  is  going  to  crack  these  passwords.  Here’s  the  reality:  on  a  Windows  10
               desktop with one graphics card, using a publicly available wordlist, I cracked the first six
               of the passwords above in less than a minute total for all of them. The others I’d guess
               could be cracked in less than a day given the same wordlist and a rule-based. So why
               the mismatch between the estimates above and the reality?

               At its core, password cracking is a math problem. The bigger the numbers involved, the
               longer it will take to compute the answer. If the size of the numbers can be reduced, the
               math problem can be solved in a shorter amount of time. Rather than brute-force every
               possible  combination  of  characters,  it  is  much  more  efficient  to  reduce  possible
               password  combinations  using  wordlists.  Popular  wordlists  have  literally  billions  of
               entries, containing:

                   •  Every known dictionary word for common languages around the world.
                   •  Colloquialisms / common phrases.
                   •  Known passwords leaked in prior major security breaches.
                   •  Dates
                   •  Months

                   •  Years
                   •  Holidays
                   •  Common names for people.
                   •  Common names for pets.
                   •  Etc.

               In  addition  to  checking  the  wordlist  passwords,  new  passwords  can  be  generated by
               applying rules which do the following:


                    •  Combines words.
                    •  Varies capitalization.
                    •  Adds numbers and symbols throughout the password.
                    •  Rolls and wraps-around password characters.
                    •  Converts to Leet (a.k.a. “l337").


                    56   Cyber Defense eMagazine – October 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   51   52   53   54   55   56   57   58   59   60   61