Post your results /g/
https://blog.kaspersky.com/password-check/
Pic related : it's mine
>>51860705
Thanks op for contributing to the new hacker password list!
>>51860739
No problem!
>>51860739
It's stated...Don't use real pass
How did they know I drive a Ferrarri?
>>51860759
I used my friend's and he used mine... are we keked?
>>51860779
Top kek
Enter password: 6 months
Delete last character: 32 years
>>51860808
Depends on sequences
Mine changed to 1000+ centuries by deleting first letter
>>51860857
DELETE THIS
>>51860808
You should try not using dictionary words m8
capitalization + romanized words from other language + numbers. cya never
I guess /pol/ is pretty safe.
It appears that gasthekikesracewarnow1488 would be quite secure password
Alright, we gud
Ayy lmao
kel it can't handle my 256 length password
Stallman be praised!
>>51860894
Note to self: Always do opposite of what /g/ says.
Whelp
Damn we got rekt
>>51861158
Fuck my sides.
>>51861192
oh shit
only use randomly* generated ones.
Which hash algorithm does this thing consider? bcrypt? SHA512 (with multiple rounds, that's what some Linux distributions use afaik)?
>>51860739
Oh no, they have one of my many passwords.
Good luck knowing where to use it, faggot.
>average home computer
Because that's what people use to bruteforce passwords, right?
>>51861306
gaytrapporn.com
>>51861239
y days
>>51861326
Welp, see you there I guess
>>51860739
I just fed it with some random passwords from pwgen I don't use. Who would trust a site like this?
>>51861334
7 days
People still fall for this?
>>51861317
>He doesn't bruteforce passwords on his 2012 macbook pro at starbucks
Time to change my email password...
>>51861317
Enter some password and then scroll down for more info
>>51860705
rekt
>entering a manga artists name, one of their work and the names of the 2 main characters breaks 10k years across the board
Didn't type my actual password, but substituted like characters
>>51860705
This has given me a new idea for how to construct my passwords.
>good goy feed our rainbow table more hashes
>>51861319
Fuck.
>>51860705
>type "12" enough times
>finally get to a century
I'm safe then.
>>51861647
That's for a password with similar structure, but entirely different characters that I use to protect my password list, AND for anything produced by the password list program.
10k centuries with keepass default
Well
+10000 Centuries Master race.
Using a compo like but not the real password, so still safe.
Kek, I've been using this password for 8 years now, on most of my accounts.
Whats annoying is creating a long, semi complicated password, to only have it leak in a breach.
Which has happened to me 3 times already.
Now I just don't care. I feel like if I create a "strong" password its either going to be leaked or create a "easy" and have it be guessed.
cool, last pass works.
>>51861976
this ^^
only best advice is don't use a obvious password. everything else is meaningless.
cool, create this 15 character password not based on dictionary words, caps and lower cases, numbers, and special characters only to have it leaked along with other personal information of yours. like email and usernames.
>>51861326
Just kill yourself and your fag admin
>>51861016
Top kek
>>51861095
Crackers have been developed around the use of conjoined words, which could probably crack such a password in several hours.
what now fuckers
> tfw Kaspersky is stealing all your passwords
Dumb fucks.
>>51862032
This is why you use a password manager and kill three birds with half a stone.
Every site having a unique password means that it isn't a HUGE deal if some shitty meme site gets hacked, and having a 256-character password with 1861 bits of entropy (see pic related) means that you'll never get bruteforced otherwise.
>>51862852
>256 character
If only all websites actually allowed passwords that long.
>>51860705
>"qqww" - 23 seconds
>"qqwww" - 3 seconds
seems legit
>thefalconfliesatmidnight
8 days
>thefalconfliesatmidnigh
>29 centuries
>cant run the test without allowing some offsite scripts
>>51862676
It all depends on dictionary sizes and clues they have to go after.
If you know people are using conjoined words then you won't bother with other lists, same in reverse. But if you don't know then it's just another avenue that has to be attacked which takes time.
>>51862923
www is a word, so it'd be more susceptible to dictionary attacks.
Fuck this
>>51861016
looks like nignogs are safe as well
I guess he's good for something after all...
DESU, I highly doubt it.
>>51861095
>>51862852
jesus christ nigga what u doing
>>51860759
But if you use a fake dumb password that is the same size and character makeup as your real dumb password, they can guess the length and character makeup of your real dumb password which would make it easy to brute force because it is, well, dumb. You would be leaking info about your security. No thanks.
>>51862852
i understand, but still ridiculous nevertheless.
>don't use real passwords
you might not use your real passwords, but the passwords you, and other people type in, could be yours, or others.
and, unless they're logging passwords by ip address, why does it matter?
oh nooooooooo
>>51860705
>Give my password to a security company
>They make a new bruteforce dictionary standard edition
>>51866896
>it says not to use your real password
>give them your real password anyway
>>51860705
Damn, I think I need a new password..
I thought this password was supposed to be strong, but according to Kaspersky, it could be bruteforced in TWO DAYS.
wtf
maxed out all sliders
password was: niggersinparadisethesecheeseburgersaintnicefamalam
>>51861073
What are you trying to hide anon?
Boom
not bad
>>51860705
>22 centuries with an average home computer
>2 minutes and 41 seconds by NSA
>>51860705
>Your password will be bruteforced with an average home computer in approximately
3DAYS
mfw
>Mikan is best ToLoveRu
>10k Centuries
Damn Straight.
>>51862852
Yea and then you have a data failure and you lose EVERYTHING AT ONCE
thanks but no
>>51860705
>2016
>not using kee/lastpass
Nice.
>>51864805
holy shit, it actually works
>>51867344
This is why you keep six or seven backups of the archive on physically separate devices.
I have three on my desktop, one on my phone, one on my laptop, one on my old laptop I use as a sever, and one on my altervista website that is outdated but I keep just in case.
>>51867344
>>51867444
Bullshit.
>>51860942
>>51860705
This means nothing without a hashing algorithm.
>>51861095
Don't kill yourself
>>51868046
Finally, someone who isn't retarted.
Absolutely nothing.
dammit
48seconds
idgaf for things only on my home network.
Still my strongest password.
I got 10000+ centuries.
>>51861466
Can confirm, works like a charm.
>>51863421
The rest is just random bullshit but this one's genuinely surprising.
>>51860884
What was it?
7 centuries
I can deal with 7 centuries
:^)
>>51860705
>input random 100-character password that password manager spits out
>there are widely used combinations
Literally what in the fuck are you talking about you drunk russian fuck?
>>51867663
>conficker botnet
Then what about the NSA/Windows botnet?
>>51869684
Kekd
>>51867444
I have it on jewgles cloud lol
ok
>>51860705
wow anon, your password sucks
>If you had Kaspersky Internet Security installed on your computer, you would know that trying to hack your professor's computer to change your grade would fail.
Literally what the duck
>>51860705
>>51860705
This is the real password I use for sites that varies for every site. Basically base + modifier. Spoilers: It's more vulnerable to a dictionary attack.
>>51862852
>be hacker
>run bruteforce.bat
>hack password in a streak of luck in one attempt
wew
>10,000+ centuries
>just a number sequence
>123456789101112131415161718192021222324252627282930
I mean really.
But for real, what kind of pleb uses dictionary words for passwords?
>>51860705
Exceptional!
10,000+ centuries
Welp, guess I need to change all my passwords now.
Will Quantum Computing make typical hashing obsolete?
>>51862852
I miss Wangblows 7 :(
10 doesn't feel comfy
>>51867311
Because not one feels that way about the worst girl. Your waifu is not popular with sweaty nerds.
According to this it takes 1 seconds to hack my Win7 password. Is the Windows password important? My other (school, work, email etc.) passwords are better.
Too easy
If I remove the last letter of my pw it goes from 2 years to 218 centuries
>>51874447
I've heard of an optimization trick for 8 characters long passwords, maybe there's something like that in play.
:^)
>You can spend this time walking to the moon and back 1 times
I wonder if using moonrunes and diacritics helps in keeping passwords hard to crack.
I use as password "Hiroyuki Nishimura". It is secure password.
>>51868046
>>51868110
samefag
>>51861306
using their list of people's passwords would be a shorter task than bruteforcing any given one.
>>51860705
lmao get gud already, mine has one capital letter, one symbol and a bunch of random letters and numbers
>>51875487
Better luck next time
4 lowercase
3 numbers
4 uppercase
Guess it's good enough
A̢̧̿̊́̑ͫ̽ͩͨ͗͠͡͏͚̗̟̟
>>51867090
Topcrack :^)
Cracked me up :^)
>>51860705
This number is using current computing power, right? it's not taking in account that in a few years those 22 centuries will become 22 days.
>>51877192
>with an average computer
10000+ on all the shit
27 centuries for the super computer
Nice
10,000+ years. A bit surprising. I guess it is ridiculously long :s.
>>51877220
the "average" largely increases every few years
>>51877100
<^>_o (O_O) o_<^> this guy got 10, 000+ on every thing to.
Schnigglefritz - 1304 centuries
Schnicklefritz - 3 months
why would these be so different?
>198 centuries for a supercomputer
I'll take it. Thanks, Kung Pow.
xkcd was right
It took 21 days for my normal password (most important sites) and 281 centuries for my master password.
What extra characters do you use for your passwords? I use_ {}[]()<>.,;:-+=ç*@?!#%$&|and most sites don't mind. Except my fucking bank that only allows [a-zA-Z0-9]