[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
How fast can your password be cracked?
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 145
Thread images: 45
File: 1406762898622.png (32 KB, 959x526) Image search: [Google]
1406762898622.png
32 KB, 959x526
http://www.passwordtester.net/
>>
that's brilliant op
but you need to add an email field while you're at it
>>
>For security reasons this site requires JavaScript. Sorry!

kek
>>
What do you mean by "your password"? Don't tell you you're still reusing passwords.
>>
>an undecillion years
>>
File: imblying.png (31 KB, 1282x267) Image search: [Google]
imblying.png
31 KB, 1282x267
>>43302448
>
>>
>>43302448
>password123

>152 days

le nigger face
>>
top fucking kek
I bet people on here will actually fall for this
>>
File: screenshot.54.png (13 KB, 972x685) Image search: [Google]
screenshot.54.png
13 KB, 972x685
password was niggers
>>
> op is a faggot
> 442 thousand years

kek
>>
>>43302545
>Password is "Example32"
>Change password to "Example23"
what a clever ruse! foiled again!
>>
>>43302448
standard password for me
>>
File: mypass.png (23 KB, 944x542) Image search: [Google]
mypass.png
23 KB, 944x542
Use full sentences.
>>
File: 1.jpg (96 KB, 768x1280) Image search: [Google]
1.jpg
96 KB, 768x1280
Lel
>>
>>43302448
Guess I'm safe for a while
>>
File: Password.png (12 KB, 960x360) Image search: [Google]
Password.png
12 KB, 960x360
It's my last name and two numbers.
>>
>>43302448
A nonillion years
>>
>>43302545
>implying most people wouldn't use a permutation of their password
>>
>>43302545
Even if I do enter my real password, they have no idea what service it's for or what username it's associated with.
>>
>>43302448
best I can get is
8 letter = 5 years... long enough for your average user - the NSA will walk through walls.
>>
>>43302662
christucker12
>>
>>43302448

>1,000 years
>164 years
>10,000 years
>137 thousand years
>>
>>43302754
they can go into your cookies. If your browser saves passwords (facebook, social media, twitter, etc.) they could get into those, or more seriously, bank accounts, credit card stuff. Highly doubtful that banking websites wouldn't have stronger security than that, however. Most likely you'll just have a spam message on your spacebook wall.
>>
>>43302545

I used this site like 4 years ago and literally nothing has ever happened to me.
>>
>>43302830
>not always using private browsing
>>
>doesn't take into account dictionary attacks
>arbitrary numbers
>helpful
>>
>in5t4ll-g3nto0 gets 2 million years
>>
File: Lel.png (19 KB, 1197x564) Image search: [Google]
Lel.png
19 KB, 1197x564
I broke it...
>>
>>43302754
Doesn't matter. Let's assume the service gets 10000 passwords entered into it. Then let's also assume 10% of them are real passwords people use. They create a dictionary of all the gathered passwords and then use it to crack the passwords on whatever service they attack. If you happen to be a user of that service (and assuming they have means to quickly parse the entire database and try the passwords against all the usernames in it), you will get cracked. If not, someone else probably will.
>>
>>43302582

nice meme!
>>
>>43302882
not using ghostry
>>
File: My real pass.jpg (54 KB, 1201x556) Image search: [Google]
My real pass.jpg
54 KB, 1201x556
>>43302911
>>
>>43302448
>35 quadrillion nonagintillion years
>?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????
>>
File: OH NO!.jpg (52 KB, 1199x545) Image search: [Google]
OH NO!.jpg
52 KB, 1199x545
>>43302933
>>
Days average desktop pc which is shit anyways. I bet anything under a few years could be cracked in hours using Amazon's cloud shit.
>>
>>43302919
I'll take my chances
>>
>>43302935
Actually, making a password out of obscure Unicode could probably be very secure, too bad most password feilds online only accept A-Z/0-9
>>
This is a great way to build a wordlist.

Also, the numbers are total bullshit. It doesn't even say what type of hash is being used to measure the computational complexity.
>>
File: passwordcracking.png (108 KB, 1557x1168) Image search: [Google]
passwordcracking.png
108 KB, 1557x1168
I'll leave this here.
>>
File: Screenshot_2014-07-30-20-49-08.png (158 KB, 1080x1920) Image search: [Google]
Screenshot_2014-07-30-20-49-08.png
158 KB, 1080x1920
NiggerFaggot for the win
>>
>WHATTHEFUCKDIDYOUJUSTSAYABOUTME

231 septillions year thanks god im secure
>>
>>43302470
>>43302545
Source is clean and no network calls were made while typing or leaving the page
>>
File: pepsi2.gif (1 MB, 280x217) Image search: [Google]
pepsi2.gif
1 MB, 280x217
>For security reasons this site requires JavaScript. Sorry!
>>
>>43302515
>>43302484
>>43303172
>>43302484
>being retarded
It's so the code is done client-side. That way it doesn't have to be sent to them and handled on their server.
>>
>>43302448
lel
>>
So I like how this password checker assumes whatever is trying to crack you pasword knows that it doesnt have symbols or numbers or letters if it doesnt have them for instance a 7 digit phone number, it claims could be cracked in under a second because it has 10 possible combinations for 7 digits. The problems with this:
first off those 7 digits by no means have to be numbers, so it should be about 52 posible combinations per digit and at the rate it suggests the computer would be going at that would actually take about 3 minutes (surprisingly fast still), not counting possible capitalization, the computer would check that last though so it doesn't really matter.

BUT thats not all It also no way for it to know that its a 7 digit long password, unless the program requires a 7 digit long password or some crap. If it has to figure out even how long it is then...
wow also 3 minutes that was a lot of math for nothing.

Last however is that thats assuming whatever you are trying to get into doesn't have a attempt lock out
>>
File: redneckreporting.png (27 KB, 955x680) Image search: [Google]
redneckreporting.png
27 KB, 955x680
type in 'nigger'
>commonly used
wat do?
>>
>>43303285
Change your password.
>>
File: password.png (19 KB, 1071x635) Image search: [Google]
password.png
19 KB, 1071x635
I use a sentence then throw a seemingly random number like the first 5 digits of e, then same special characters for good measure.

If a service doesn't let me use a password at least 20 characters in length, I don't use the service
>>
>>43303285
If you make it "niggers" it at least doesn't say instantly. It'd be cracked in 8 tenths of a second.
>>
0 seconds because you just gave some neckbeard sysadmin your password
>>
>>43303172
>>For security reasons this site requires JavaScript. Sorry!
Is it even possible to get away from Javascript these days? And why does everyone think its the scum of the earth? There needs to be client-side scripting to keep the client from taxing the server every time a slight adjustment to the site is made.

>>43303270
Fork it
>Last however is that thats assuming whatever you are trying to get into doesn't have a attempt lock out
>Autism
>BUT thats not all It also no way for it to know that its a 7 digit long password
Retarded autism. It's not supposed to crack your password, just compute how long it takes to crack, therefor it HAS to know how long it is. It's one of the parameters of the calculation.

>>43303329
You can achieve sufficient entropy in under 20 characters buttfucker.
>>
File: password.png (20 KB, 929x545) Image search: [Google]
password.png
20 KB, 929x545
Looking good
>>
>>43303097
>that layout
Oh shit nigger, what are you doing?
>>
File: cpissafefor2billionyears.png (18 KB, 926x558) Image search: [Google]
cpissafefor2billionyears.png
18 KB, 926x558
>>43303319
>>43303333
nah im good, this is my actual password:
>>
99 quadrillion nonagintillion years
>>
>>43302448
>type in pass
>botnet now has your password
>>
>nigger
>Common Password: In the top 980 most used passwords

Nigger is top 980 most used passwords. This is great.


https://www.youtube.com/watch?v=suePk14aqfo
>>
File: computers are racist.jpg (68 KB, 450x200) Image search: [Google]
computers are racist.jpg
68 KB, 450x200
>>43303504
Sounds like something a nigger would find impressive
>>
wewt, muh key
>>
>>43303504
hitler is in about the top 3000.
>>
>>43303504
no one expects nigger to be used since it's so taboo

my wifi password is ihateniggers

no one will guess it
>>
>>43303370
that is not at all what i meant, I meant that a cracking program running on a computer would have no idea so would assume small and work its way up. Also it would run through a wordlist before checking numbers, which if you have ever run before you would know it takes a long ass time so ya I think this program vastly underestimates the strength of passwords.


Its not giving how long a computer would take to crack a password in almost any real life situation
>>
>>43303614
Give me your password and I will tell you how long it takes my rig to crack it
>>
File: Untitled123.jpg (105 KB, 1244x725) Image search: [Google]
Untitled123.jpg
105 KB, 1244x725
Good luck
>>
>>43303614
it's heavily pushing password managers
>yes goyim let me hold onto your bank passwords u can trust me honest
>>
How do I know it's not a honeypot?
>>
File: inf.jpg (70 KB, 647x638) Image search: [Google]
inf.jpg
70 KB, 647x638
>>
File: password.png (11 KB, 874x395) Image search: [Google]
password.png
11 KB, 874x395
Well here's one from a password generating script that I use.

}Y\?Hu(21~]u3+JCN.{tl,E>MstMOn!%
>>
hunter2
>>
>>43303698
Roll the dice faggot.
>>
>>43302545
>implying I didn't just use a similar pattern to the one I use to generate my real passwords.
>>
>>43303698
It is. for sure. nobody would go through the effort to make a page like that if it didn't generate income, and selling password lists generates income.
>>
>>43303768
I expected less cynicism from the board on 4chan that support open source the most.
>>
>>43303768
so does the huge advertising banner in the middle of the page..
>>
>>43303799
Given the opportunity anyone would cash in with the password list.
>>
>>43303820
not necessarily
really they have very little
just random combinations that may or may not be passwords to actual accounts that they nothing more about
lists of common passwords are abundant and can be found easily on the interwebs
>>
>>43302448

I just tried
>TestWord

and

>eEymoQlo

and got the exact same estimate

this is the biggest load of horse shit
>>
>>43303481
^This

I was gonna test my paypal password, then I came to my senses and tested something similar with the same amount of numbers and letters.
>>
File: the jetsons wont even crack it.png (8 KB, 970x352) Image search: [Google]
the jetsons wont even crack it.png
8 KB, 970x352
got nothin to worry about it seems
>>
>>43303887
It's calculated using brute-force. Not dictionary, no rainbow tables, just pure brute force. They would end up being the same.
>>
>>43303887
Two words together is just as good, if not better, a password than random characters.
>>
>>43303997

no

>>43303994

what do you mean by "end up being the same"

no one uses brute force these days
>>
>>43303789
Well give us the source
>>
File: absolutely halal.jpg (322 KB, 531x471) Image search: [Google]
absolutely halal.jpg
322 KB, 531x471
>>43303984
>the jetsons wont even crack it
Laughed like a faggot. Made my day anon.
>>
File: install gentoo.png (8 KB, 968x359) Image search: [Google]
install gentoo.png
8 KB, 968x359
>install gentoo
>>
>>43302597
"phrases", they're called passphrases.
>>
>>43304108
Allahu kekbar
>>
pw: "Iwanttogotothebathandtakeapiss"

It would take a desktop PC about 184 nonillion years to crack your password

top lek
>>
"hunter2" takes seven seconds.
>>
>>43303887
>he doesn't know how brute force works
>>
File: testpass.png (31 KB, 973x818) Image search: [Google]
testpass.png
31 KB, 973x818
Not bad for it being super simple.

I figure a dictionary force would probably break a simple date string (year in roman numerals) quickly though.
>>
It can't into non-standard characters.

? is always zero seconds, unless you add a letter or something.
>>
File: Screenshot (6).png (121 KB, 1366x768) Image search: [Google]
Screenshot (6).png
121 KB, 1366x768
Hello. ?
>>
TESTINGatest123$
>>
File: LELINSTALLGENTOO.png (35 KB, 1142x880) Image search: [Google]
LELINSTALLGENTOO.png
35 KB, 1142x880
i dont think lelinstallgentoo as a password is this safe but ok
>>
File: alec.png (79 KB, 1440x875) Image search: [Google]
alec.png
79 KB, 1440x875
"IloveitwhenAlecBaldwinfucksmyasshole"
>>
>>43305232
so then it may be ignoring the entropy from such things as well. I mean, can you even USE altcodes in passwords? I've never even tried. It makes sense, it would make the search space for each character fucking enormous.
>>
File: am i fugged.jpg (89 KB, 692x800) Image search: [Google]
am i fugged.jpg
89 KB, 692x800
I just use my cock.li e-mail account for passwords.
>>
>Your password would be cracked almost instantly
Apparently "password" isn't a good password
>>
>>43302448
it's shit
it needs to factor in exponential growth of computing power
seriously, then it would actually be useful information
>>
>34 septendecillion years
>>
>>43302448
>hey stupid anon, why don't you just type in all your password here, don't worry we are not collecting them
>>
File: 77017-19956-galactus.jpg (150 KB, 400x639) Image search: [Google]
77017-19956-galactus.jpg
150 KB, 400x639
>All these mortals thinking their passwords will be safe for 100 quintitripillionzerg years.

I can wait.
>>
>>43307094
It's offline javascript, you moron. Run it in a VM, cut your ethernet cable in half and type in a password similar to yours if you're that paranoid.
>>
>Common Password: In the top 10 most used passwords
Whatever, it's not like people actually check these things.
>>
>>43307146
>butthurt op
>>
>>43307173
Fantastic argument there.
>>
kyon-kun denwa
>>
>>43302448
shit doesn't even work right
> enter password with letters and numbers

> length: 8 characters
correct

> character combinations: 62
correct, but the guesser can't assume this

> possible combinations: 214 trillion
what? no
62^8 = 218340105584896

great software, OP
>>
% pwgen -1sy 16 1


>It would take a desktop PC about 164 trillion years to crack your password
I'm OK
>>
>>43302448
151 billion years
I think I'll be safe for now.
>>
>405 septillion sexagintillion years
>>
% pwgen -1sy 256 1


>It would take a desktop PC about Infinity years to crack your password
Lies.
>>
>>43302448
>A trillion years
>Length: 15 characters
>Character Combinations: 96
>Calculations Per Second: 10 billion
>Possible Combinations: 542 octillion
>>
>>43303604
>hey anon thanks for letting me come over, by the way can I have your wifi password?
>>
File: hue.png (18 KB, 865x536) Image search: [Google]
hue.png
18 KB, 865x536
Always used and always will use a password using my first and last name + my phone number.
firstnamePhoneNumberlastname

Easy to memorize, and very secure.
>>
>>43307966
extremely insecure from social engineering however
>>
>>43307983
Well, if they can actualy associate that the password is actualy my real first and last name then yes.
The phone number is long dead though, last time I used it was 10 years ago.
>>
>>43302448
>inb4 this is a honeypot for collecting passwords
>>
>>43308018
>actualy saving cookies
>not entering the website in incognito mode
>>
couldn't the owners of this site use it to build a huge database of passwords and their hashes?
>>
>>43308086
>implying things like this dont already exist
>>
File: pass.png (24 KB, 1198x564) Image search: [Google]
pass.png
24 KB, 1198x564
wouldyouliketomakingfuckberzerker
>>
>just hold down the A key
>It would take a desktop PC about Infinity years to crack your password
k
>>
File: passtest.png (24 KB, 968x543) Image search: [Google]
passtest.png
24 KB, 968x543
what is this password site, some kind of password honeytrap for tards?

thats the result for symbols letters and numbers, kek
>>
Fuck all y'all
>>
I don't trust that site.
>>
File: .png (132 KB, 1304x919) Image search: [Google]
.png
132 KB, 1304x919
It crashed.
>>
> 540 years
> 816 million years
> 0.0001 seconds
> 23 years
>>
File: bascart man.gif (2 MB, 192x144) Image search: [Google]
bascart man.gif
2 MB, 192x144
>>43307821

>not having a quarantine network behind a cheapo wireless router for when company comes over
>>
>>43307821
>no
>>
>>43308405
Bosse
>>
Can somebody explain to me why an 18 number password takes 3 years but a 13 letter password takes 7 years? Hoes this algorithm know before it starts cracking whether I use letters or numbers? Why doesn't it just know my password already and take 0 seconds? or are you going to tell me that it first checks for passwords consisting solely of numbers until the 18th place and then starts over at the beginning, but this time with only letters, then letters and numbers and then special signs? what a shitty algorithm!
>>
>>43309952
*Does this algorithm
>>
>>43309952
I am in no way an expert on this topic.

It has something to do with the unpredictability of the characters, which is known as "entropy." I'm not sure how it's calculated but usually a password that is quite linear such as "12121212" is highly predictable, whilst "921bvq2B234623B^@6235^)*#!~n8[5124b56a46w$%^N#45!@#$^b1234567b" is utter nonsense that my hand generated with no intention of hitting certain keys.
>>
>>43302448

>javascript

Seems legit :^)
>>
File: niggers-tongue-my-anus.jpg (37 KB, 513x299) Image search: [Google]
niggers-tongue-my-anus.jpg
37 KB, 513x299
>>43302448
>It would take a desktop PC about 7 quintillion years to crack your password
>>
File: huehuehue.png (129 KB, 350x370) Image search: [Google]
huehuehue.png
129 KB, 350x370
>>43310256
This means my botnet consisting of 7 quintillion desktop computers would only need a single year. Weak password, brah
>>
File: Screenshot - 310714 - 21:17:47.png (15 KB, 787x232) Image search: [Google]
Screenshot - 310714 - 21:17:47.png
15 KB, 787x232
I just used the site's disclaimer.
>>
>My password for work stuff is the first 30 digits of pi

Easy to remember and there's no way anyone's going to guess that.
>>
File: rQz6euw.png (280 KB, 640x522) Image search: [Google]
rQz6euw.png
280 KB, 640x522
Childhood video game character plus my school ID nimber from high school (7 numbers long) along with my first name

21 characters long

142 quadrillion years

I feel plenty safe
>>
File: Capture.png (5 KB, 869x164) Image search: [Google]
Capture.png
5 KB, 869x164
ireallyneedtotakeashitniggah

Niggah that needs to take a shit is safe.
>>
>>43302448
>676 million nonagintillion years
It's my login password for 4chan
>>
File: 1377806569113.jpg (98 KB, 600x900) Image search: [Google]
1377806569113.jpg
98 KB, 600x900
>>43303614
>I think this program vastly underestimates the strength of passwords.
Don't you mean overestimate?

Also
> I meant that a cracking program running on a computer would have no idea so would assume small and work its way up.
Irrelevant. The keyspace grows exponentially. The keyspace of all 1-long passwords + all 2-long passwords + ... + all n long passwords is completely dominated by the keyspace of the longest possible password.
Thread replies: 145
Thread images: 45

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.