Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

password strength ``checkers''

Name: Anonymous 2012-12-14 0:28

Why don't they take into account dictionary attacks?

Half of the time "faggothomosexual123" is ``more secure'' than "thjodukd"

And then some of them actually use their shitty measurement to block you from registering/changing your password. The audacity.

Name: Anonymous 2012-12-14 0:48

back to http://xkcd.com/936/, please.

Name: Anonymous 2012-12-14 1:07

>>2
except that's completely wrong

Name: Anonymous 2012-12-14 1:48

>>2
That doesn't apply here, Faggotron-3000. >>1-closet-homosexual clearly generates his passwords randomly and stores them somewhere other than his mind.

Name: Cudder !MhMRSATORI!fR8duoqGZdD/iE5 2012-12-14 7:22

How would a dictionary attack program know your password contains 2 dictionary words, all lower case, followed by a 3-digit number? It doesn't. It has to try all the possibilities.

Name: Anonymous 2012-12-14 8:49

>>5
Rainbow tables, with dictionary translation. Faster than with the same table, having something like this:
.*&馬ζηιτ101

Name: Anonymous 2012-12-14 8:58

>>5
I think 123 and 321 are so common you might as well check them first. I don't think the pattern (word1)(word2)123 is too uncommon.

Name: Anonymous 2012-12-14 9:15

>>7
It is. So much ,I present you the most prevalent human password function:
digits = random (time())%2
if (digit == 0)
  for i = 1; {1-9*} ({a-z*,A-Z*} x i);i++;
else  
  for i = 1; ({a-z*,A-Z*} x i) {1-9*};i++;
endif

  for i = 1; {1-9*}{a-z,A-Z}*i*{1-9*};i++;

1337 dictionary is all set as well. Symbols like ~|'"?/<>$&@* are also in my 1337 dictinary tables.

Name: 8 2012-12-14 9:20

noted the last one incorrect. It should be something like
  for i = 1; {1-9*}({a-z*,A-Z*} x i) {1-9*};i++;

and i is number of words. Usually 1-3 is a good estimate. 4 for the stretchers, but I never meet one with 5 words.

Name: Anonymous 2012-12-14 9:49

>>8
>>9
But you're right, password checkers are a solution to a problem which shouldn't exist. The only passwords that should exist ought to be GUIDs, as long it possible to copy paste that is, so exceptions for OS login, telephones etc.

Name: Anonymous 2012-12-14 10:07

Check your passwords against huge dumps of leaked passwords and known methods employed by popular password crackers.

Name: Anonymous 2012-12-14 10:23

>>11
No, just check if it's a GUID, one that you gave the user.

Name: Anonymous 2012-12-14 10:33

Doesn't take much to fool dictionary attacks and rainbow tables simply by inserting prefix and postfix symbols after each word.

Thr best passwords are written LISP code anyway.

Name: Anonymous 2012-12-14 10:34

>>13
Best passwords are written Perl code!

Name: Anonymous 2012-12-14 10:52

>>8
that's not valid javascript. try again, troll.

Name: Anonymous 2012-12-14 11:28

My passwords are all key patterns I know how to type. I just insert some shift in there and I'm done.

Name: Anonymous 2012-12-14 13:15

>>10
If you can't remember it, that means you have to save it someplace—on a file or on a piece of paper. This simplifies the attacker's plan of action.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List