How I'd Hack Your Weak Passwords
How I'd Hack Your Weak Passwords
http://lifehacker.com/5505400/how-id-hack-your-weak-passwords
Lifehacker
1 of 4
1/15/2011 1:03 PM
http://lifehacker.com/5505400/how-id-hack-your-weak-passwords
2 of 4
1/15/2011 1:03 PM
http://lifehacker.com/5505400/how-id-hack-your-weak-passwords
just a matter of time bef ore the computer runs through all the possibilities or gets shut down try ing. Pay particular attention to the dif f erence between using only lowercase characters and using all possible characters (uppercase, lowercase, and special characters like @#$%^&*). Adding just one capital letter and one asterisk would change the processing time f or an 8 character password f rom 2.4 day s to 2.1 centuries. Remember, these are just f or an av erage computer, and these assume y ou aren't using any word in the dictionary . If Google put their computer to work on it they 'd f inish about 1,000 times f aster. Now, I could go on f or hours and hours more about all sorts of way s to compromise y our security and generally make y our lif e miserable but 95% of those methods begin with compromising your weak password. So, why not just protect y ourself f rom the start and sleep better at night? Believ e me, I understand the need to choose passwords that are memorable. But if y ou're going to do that how about using something that no one is ev er going to guess AND doesn't contain any common word or phrase in it. Here are some password tips: 1. Randomly substitute numbers f or letters that look similar. The letter o' becomes the number 0, or ev en better an @' or *'. (i.e. m0d3ltf 0rd like modelTf ord) 2. Randomly throw in capital letters (i.e. Mod3lTF0rd) 3. Think of something y ou were attached to when y ou were y ounger, but DON'T CHOOSE A PERSON'S NAME! Ev ery name plus ev ery word in the dictionary will f ail under a simple brute f orce attack. 4. May be a place y ou lov ed, or a specif ic car, an attraction f rom a v acation, or a f av orite restaurant? 5. Y ou really need to hav e dif f erent username / password combinations f or ev ery thing. Remember, the technique is to break into any thing y ou access just to f igure out y our standard password, then compromise ev ery thing else. This doesn't work if y ou don't use the same password ev ery where. 6. Since it can be dif f icult to remember a ton of passwords, I recommend using Robof orm f or Windows users. It will store all of y our passwords in an encry pted f ormat and allow y ou to use just one master password to access all of them. It will also automatically f ill in f orms on Web pages, and y ou can ev en get v ersions that allow y ou to take y our password list with y ou on y our PDA, phone or a USB key . If y ou'd like to download it without hav ing to nav igate their web site here is the direct download link. (Ed. note: Lifehacker readers love the free, open-source KeePass for this duty, while others swear by the cross-platform, browser-based LastPass.) 7. Mac users can use 1Password. It is essentially the same thing as Robof orm, except f or Mac, and they ev en hav e an iPhone application so y ou can take them with y ou too. 8. Once y ou'v e thought of a password, try Microsof t's password strength tester to f ind out how secure it is. By request I also created a short RoboForm Demonstration v ideo. Hope it helps Another thing to keep in mind is that some of the passwords y ou think matter least actually matter most. For example, some people think that the password to their e-mail box isn't important because "I don't get any thing sensitiv e there." Well, that e-mail box is probably connected to y our online banking account. If I can compromise it then I can log into the Bank's Web site and tell it I'v e f orgotten my password to hav e it e-mailed to me. Now, what were y ou say ing about it not being important? Of ten times people also reason that all of their passwords and logins are stored on their computer at home, which is saf e behind a router or f irewall dev ice. Of course, they 'v e nev er bothered to change the def ault password on that dev ice, so someone could driv e up and park near the house, use a laptop to breach the wireless network and then try passwords f rom this list until they gain control of y our network af ter which time they will own y ou! Now I realize that ev ery day we encounter people who ov er-exaggerate points in order to mov e us to action, but trust me this is not one of those times. There are 50 other way s y ou can be compromised and punished f or using weak passwords that I hav en't ev en mentioned. I also realize that most people just don't care about all this until it's too late and they 'v e learned a v ery hard lesson. But why don't y ou do me, and y ourself , a f av or and take a little action to strengthen y our passwords and let me know that all the time I spent on this article wasn't completely in v ain.
3 of 4
1/15/2011 1:03 PM
http://lifehacker.com/5505400/how-id-hack-your-weak-passwords
Please, be saf e. It's a jungle out there. EDIT: Y ou might also want to listen to my interv iew on Connecticut Public Radio about password security . How I'd Hack Y our Weak Passwords [One Man's Blog]
Follow us to see the most popular stories among y our f riends -- or sign up f or our daily newsletter below. Get Lif ehacker in y our inbox:
Lifehacker on Facebook
Like 167,549 people like Lifehacker.
Ah
Guillermo
Phyo
Karl
Teresa
Archives Advertising
Original material is licensed under a Creative Commons License permitting non-commercial sharing with attribution.
4 of 4
1/15/2011 1:03 PM