DEFCON 17: Cracking 400,000 Passwords, or How to Explain to Your Roommate why Power Bill is a High

  Рет қаралды 296,680

Christiaan008

Christiaan008

Күн бұрын

Speakers:
Matt Weir PhD Student, Florida State University
Professor Sudhir Aggarwal Florida State University
Remember when phpbb.com was hacked in January and over 300,000 usernames and passwords were disclosed? Don't worry though, the hacker only tried to crack a third of them, (dealing with big password lists is a pain), and of those he/she only broke 24%. Of course the cracked password weren't very surprising. Yes, we already know people use "password123". What's interesting though is figuring out what the other 76% of the users were doing. In this talk I'll discuss some of my experiences cracking passwords, from dealing with large password lists, (89% of the phpbb.com list cracked so far), salted lists, (Web Hosting Talk), and individual passwords, (TrueCrypt is a pain). I'll also be releasing the tools and scripts I've developed along the way.
For more information visit: bit.ly/defcon17_information
To download the video visit: bit.ly/defcon17_videos

Пікірлер: 297
@qthermal
@qthermal 7 жыл бұрын
Wow they have the decency to include their tools and scripts for all to use. Most researchers are too uptight to share outside the academic and corporate world. Keep up the good work!
@dajhrm
@dajhrm 7 жыл бұрын
The presenter left more out on how to actually do it than he shared. You now have a very basic on how to get started cracking complicated passwords with good encryption, if you spend some time researching
@talhatariqyuluqatdis
@talhatariqyuluqatdis 6 жыл бұрын
Gooseworks Labs what specifically did he leave out?
@astrionn6182
@astrionn6182 8 жыл бұрын
11:30 --> facebookpassword , youtubepassword , passwordmanagerpassword XD
@marsglorious
@marsglorious 11 жыл бұрын
"Take everything I say with a grain of salt." - I see what you did. Ha....... ha..... ha..... Professional Comedy.
@squirrel7t7
@squirrel7t7 9 жыл бұрын
Pausing on some of those passwords being churned out can be quite comical
@HyperionNyx
@HyperionNyx 9 жыл бұрын
***** vagina5
@Davepiton
@Davepiton 9 жыл бұрын
HyperionNyx dude56
@nand3kudasai
@nand3kudasai 8 жыл бұрын
squirrel7t7 35:24 password! #1bitch lol
@supercreeperhoodie
@supercreeperhoodie 8 жыл бұрын
+squirrel7t7 Dickweed12
@couches
@couches 5 жыл бұрын
33:44 dickweed12
@VitalStryke
@VitalStryke 11 жыл бұрын
You know what's hilarious? Defcon is full of federal agents.
@dangelovihaan2406
@dangelovihaan2406 2 жыл бұрын
you probably dont give a damn but does someone know a way to log back into an Instagram account?? I stupidly forgot my account password. I would appreciate any tricks you can offer me!
@merricknixon1826
@merricknixon1826 2 жыл бұрын
@Dangelo Vihaan instablaster ;)
@dangelovihaan2406
@dangelovihaan2406 2 жыл бұрын
@Merrick Nixon thanks for your reply. I got to the site on google and Im waiting for the hacking stuff now. Looks like it's gonna take quite some time so I will get back to you later when my account password hopefully is recovered.
@dangelovihaan2406
@dangelovihaan2406 2 жыл бұрын
@Merrick Nixon It did the trick and I now got access to my account again. I'm so happy! Thank you so much you saved my account :D
@merricknixon1826
@merricknixon1826 2 жыл бұрын
@Dangelo Vihaan glad I could help xD
@stephaniewilson3955
@stephaniewilson3955 7 жыл бұрын
I am astonished to find that my password would be in that last 5%. Random numbers, letters (caps and lower case) and symbols. Of course I do write mine down to keep track of them: in a notebook that never leaves my flat and I leave the old passwords in it as well as the updates so have fun!
@hellterminator
@hellterminator 8 жыл бұрын
I love all these arbitrary rules about how a strong password should look that people post in the comments. What a good password needs is sufficient entropy. How you get that entropy-whether by randomly generating a password composed of all printable ASCII characters, or by stringing together a list of 5 or 6 randomly chosen nouns, all in lowercase-is absolutely irrelevant.
@TheRyseAgainst
@TheRyseAgainst 7 жыл бұрын
This just HAS to be the brother of Andy Weir (author of The Martian). Not only the face but even the style of talking is really similar :D
@amyshaw893
@amyshaw893 2 жыл бұрын
Andy Weir is an only child
@boneappletee6416
@boneappletee6416 2 жыл бұрын
I love that the video has had the chapters/timestamps added :)
@MarcoSaldana
@MarcoSaldana 9 жыл бұрын
Matt, good presentation! Have you received your PHD yet?
@jose.gonzalez.2007
@jose.gonzalez.2007 5 ай бұрын
Yeah
@abernardist
@abernardist 10 жыл бұрын
any body know if he updated this talk
@Roblx518
@Roblx518 7 жыл бұрын
So....IT weakness requires all the customers, employees and guests to support it....and how many compromises a day require a change with no benefit in reality?
@f1urps
@f1urps 4 жыл бұрын
drinking game: take a shot every time he says "go ahead and"
@xnor40
@xnor40 11 жыл бұрын
It depends on how the passwords are hashed. If its made using md5(salt+pass) john should be able to crack it without any custom modules. Read the documentation on the openwall website.
@Cellardoorpromotion
@Cellardoorpromotion 11 жыл бұрын
is it misspelled as well?
@russellchido
@russellchido 11 жыл бұрын
#1 Development excuse for slacking of: compiling >Hey! Get back to work! >COMPILING! >Carry on
@dannie92
@dannie92 11 жыл бұрын
interesting talk, and he seems like a really cool dude
@zecnobot
@zecnobot 11 жыл бұрын
"Dude, we have a Dell." LOL
@wende2003ya
@wende2003ya 12 жыл бұрын
It is easy to crack something than to fix it.This explain why research are still focusing on how to create an efficient and secured password. The speaker gave many links to allow anyone to further their knowledge on the subject.
@GladerDev
@GladerDev 10 жыл бұрын
Well, when did he attribute?
@xnor40
@xnor40 11 жыл бұрын
If the salting is done properly and the password is strong its hard. Its not impossible but requires good hardware and a lot of time.
@D_OGSHIT
@D_OGSHIT 9 жыл бұрын
Good talk (:
@JT7868
@JT7868 8 жыл бұрын
... he took his laptop to defcon?
@Freakschwimmer
@Freakschwimmer 8 жыл бұрын
+JT7868 That's why his Bluetooth and WLAn are disabled ;)
@HRRRRRDRRRRR
@HRRRRRDRRRRR 7 жыл бұрын
And probably running on another hard drive that he's just going to smash into little pieces.
@santiagoferrari1973
@santiagoferrari1973 5 жыл бұрын
most probably a second one, not his main. Clean AF it must be
@DimMagician
@DimMagician 8 жыл бұрын
Before the PW requirements, i used to us the PW 543216. No one finds it but it would be easy to crack it though.
@ti0nate
@ti0nate 11 жыл бұрын
Just wondering if anyone knows how to crack a MD5 that has salt in it?
@cmd19872002
@cmd19872002 12 жыл бұрын
I never used JtR, but I have used a program called barswf which can only attack plain md5 hashes just as the speaker did in his first attack. On my home built 6 core amd computer (~$1000 cost to build), I could perform 300+ MILLION hash attempts per second. If you get a high end graphics card for around $400-700, you could blow that number out of the water by FAR. I don't remember the exact number, but it was in the billions. HashCat does well for salted ones. I could get 90%+ in less than a day
@DaveGrantTR
@DaveGrantTR 5 жыл бұрын
Nice video
@Otterrat
@Otterrat 11 жыл бұрын
Oh great, apparrently I needed to change my passwords 2 years ago. :P
@kairei7689
@kairei7689 11 жыл бұрын
props, he is very smart.
@Meneltour27
@Meneltour27 8 жыл бұрын
i like my system more than md5(md5(password).salt).... it's something like 200xmd5(md5(200xmd5(password.hardcodedsalt)).salt)) not the exact values and the hardcoded salt is only visible in the code that generates the hashes. I don't know if it is an overkill(might be) or something that can be easylly hacked but anyway it is almost 400++ md5 you have to do for every password and that takes time if you have any suggestions i would love to hear them
@cudiaco
@cudiaco 7 жыл бұрын
You're better off using something like PBKDF2 or bcrypt for securely hashing your passwords. Ditch MD5.
@error.418
@error.418 7 жыл бұрын
also use random salts for each
@CrazyArcadian
@CrazyArcadian 5 жыл бұрын
Md5 has a limited total key space, si hashing that much still gives you and md5 stream within that limited key space. Thus you final hash could be generated with another password that shares the same key. Thus ditch md5.
@attilahorvath5972
@attilahorvath5972 4 жыл бұрын
I don't understand one thing though. You take random words and MD-5 hash them and compare them to the users saved password. But in order to do this you have to have the HASH file first right?! How do you get the /etc/passwd file? I assume first you need to break into the OS and then you get the /etc/passwd file where all the HASHES are. But when you already has root privileges on an OS in order to copy this passwd file, why would you need to crack the user's passwords?? I don`t get it.
@esquilax5563
@esquilax5563 4 жыл бұрын
Yes, this was mentioned in the talk. You need to first break into the system to somehow get the list of hashes. Since most people reuse passwords, you can use any cracked passwords to log in to other accounts of theirs
@sundhaug92
@sundhaug92 11 жыл бұрын
You don't necessarily need to crack it, "just" find a collision.
@lipa90
@lipa90 11 жыл бұрын
time to change my passwords
@Zack-dk3pt
@Zack-dk3pt 7 жыл бұрын
this made me think of why websites that give you a checklist for your password are bad and work against you cuz instead of people having random passwords they have a password designed based off a certain of rules bad guys just has to follow those rules so he knows if there is atleast ine capital let or atleast one number and usually people add the numbers to the end of the iriginal password and capitaluze the first letter or change letters like e to a 3 or for to 4
@anarchismconnoisseur2892
@anarchismconnoisseur2892 7 жыл бұрын
To be uncrackable(at least until AES-512 encryption becomes mainstream) you need a 20+ character password, generated by a password generator, not by your brain.
@thecommoncoldvirus642
@thecommoncoldvirus642 5 жыл бұрын
Rodrigo Duterte AES-512 isn’t mainstream because AES is defined only for key sizes of 128, 192, and 256 bits. You could possibly use Rijndael which would allow you to use variable key sizes.
@paco4756
@paco4756 5 жыл бұрын
@@dueldu70 or look up the result in the EFF long word list.
@AureliusR
@AureliusR 3 жыл бұрын
You left this comment 4 years ago, and it's STILL not true. 9-12 character passwords are still pretty much unbreakable. 20+ might give you a sense of security against possible quantum computing techniques, but encryption/hashing has actually started to solve those problems before they even exist. There are many hashing algorithms that exist today that researchers are confident would withstand quantum computing attacks.
@samwansitdabet6630
@samwansitdabet6630 7 ай бұрын
source: made it the fuck up
@stephenhunter70
@stephenhunter70 5 жыл бұрын
I'd be concerned about the webhosting sites administrator accounts and their passwords
@dfarrall
@dfarrall 11 жыл бұрын
Cool story bro..
@thephantom1492
@thephantom1492 7 жыл бұрын
Since people reuse the same password everywhere, I suggest them to actually use a few, one for their emails, one per bank and one for the rest of the non-important, non-financial associated stuff. Atleast if something is compromised it will not compromise everything. I think it is a good start.
@AaronSherman
@AaronSherman 11 жыл бұрын
I'm confused. This "research" seems to mostly be collections of traditional wisdom from 15-20 years ago when I was working on password cracking (mostly as a tool for validating that users had selected strong passwords, which is an interesting job because you're not TRYING to succeed, just to verify that you can't succeed easily). Anyway, probabilistic approaches to brute-force were all the rage back then. Did everyone just forget what we learned?
@spencerreppe7558
@spencerreppe7558 4 жыл бұрын
The real question is whether a quantum computer would be better at cracking passwords vs a AL algorithm.
@killersushi99
@killersushi99 9 жыл бұрын
What if my password is Japanese words?? Arigato1! for example or konichiwa!4 etc.
@okuno54
@okuno54 8 жыл бұрын
+killersushi99 Then a japanese hacker will crack it in about 2 seconds using his gaijin dictionary.
@killersushi99
@killersushi99 8 жыл бұрын
+Okuno Zankoku I don't think his dictionary will have numbers and special characters in it after the word : /
@okuno54
@okuno54 8 жыл бұрын
***** Did you watch the video? With the word mangling?
@jaredawesomepants9462
@jaredawesomepants9462 7 жыл бұрын
my password in uncrackable, it's qqqqqqqq
@yourpersonalspammer
@yourpersonalspammer 6 жыл бұрын
the password 1qqqqq was cracked in 33 seconds, so I don't know about that....
@l-l
@l-l 7 жыл бұрын
Does anyone have any good password managers to recommend.
@jean-jacqueschirac8733
@jean-jacqueschirac8733 7 жыл бұрын
*_Fahrenheight_* i think a youtuber called n-o-d-e does some pretty good reviews on them
@l-l
@l-l 7 жыл бұрын
Jean-Jacques Chirac thank you
@Jbdoster
@Jbdoster 6 жыл бұрын
lol'd at the title so hard just now
@TASCardude419
@TASCardude419 9 жыл бұрын
Ive actually made a rainbow table creator that uses sockets to give work to an army of slaves to do hashing
@-__-_-_--__--_-__-_____--_-___
@-__-_-_--__--_-__-_____--_-___ 7 жыл бұрын
Some of these passwords are top tier lulz
@Beall619
@Beall619 5 жыл бұрын
5:28 "Water is Wet"
@Roblx518
@Roblx518 7 жыл бұрын
so....users have tools to powerful for their understanding.....and users and IT are blamed instead of poor management choices for tools or staff.
@trane25
@trane25 12 жыл бұрын
great
@dajhrm
@dajhrm 7 жыл бұрын
Some passwords cant be cracked in our lifetime or a hundred lifetimes if they are strong with at least 8 character sets, even with todays fastest number crunchers it would take thousands of years, the speaker has intentionally left out key steps on how he actually attempted to crack the passwords, he left very important things out actually.
@davidburton79
@davidburton79 7 жыл бұрын
This isn't a tutorial neither is it even about cracking a specific password. If you can crack 98% of passwords and you're doing this for monetary gain who cares about the hardest 2%? Statistically you'll be making a lot less money with those passwords.
@Bvic3
@Bvic3 2 жыл бұрын
Yes, but you use the same invincible password on different sites and one of them has it in plain text.
@howtomundane3109
@howtomundane3109 Жыл бұрын
That's why Agencies around the world put their hopes & money into Quantum Computation
@darkwarrior396
@darkwarrior396 10 жыл бұрын
i have a 11 gb wordlist, is it enough?
@JakeDavidHarrison
@JakeDavidHarrison 9 жыл бұрын
***** That's a terrible way to perform a brute-force attack, especially a remote one, a dictionary attack is in every way better. A little maths for you; Assuming that any password worth its salt (pun intended) is at least 6chars in length and there are roughly 70 different chars usable in passwords, uppercase + lowercase + numbers + a handful of special chars. That means you send 70^5 + 70^4 + 70^3 + 70^2 + 70 possible passwords before you even get to a 6char length string, at a frequency of 120 /second that would have taken you over 164 days. That's a pitiful and utterly useless attack.
@JakeDavidHarrison
@JakeDavidHarrison 9 жыл бұрын
***** Attacking with all the 6char passwords alone at a frequency of 120 /second would take you over 30years.
@theTribesHawk
@theTribesHawk 9 жыл бұрын
***** I know that sounds appealing in theory but in practice most people use real words or combinations/variations of them anyway, making the dictionary attack much more efficient than trying every possible combination.
8 жыл бұрын
+Jake Harrison It depends what your trying to brute force, if your trying to get some random kids password then yeah dictionary will be ok, but if your brute forcing some site on the deep web then maybe you will need to wait 164 days
@hellterminator
@hellterminator 8 жыл бұрын
+CantFindANameThatIsNotAlreadyUsedSoIUsedThisOne Sure, a dictionary attack may fail but it will do so quickly. If I start a dictionary attack in the morning, in the evening I'll know whether it has been successful or not. If you start your attack, you will be dead by the time it gets around to trying 7 character passwords.
@-__-_-_--__--_-__-_____--_-___
@-__-_-_--__--_-__-_____--_-___ 7 жыл бұрын
Time to go change all my simplistic passwords lol
@balajiLILG
@balajiLILG 8 жыл бұрын
ah ha sudir agarwal an Indian guy :) damn we are everywhere !
@thanewalker6575
@thanewalker6575 11 жыл бұрын
I didn't even noticed it had lisp.
@togwam
@togwam 5 жыл бұрын
Did you know that if you accidentally typed your KZfaq password in the comments, some googly algorithm will automatically turn it into asterisks for you for protection For example my password is ************
@RapperNamedQUICK
@RapperNamedQUICK 11 жыл бұрын
Accidently clicked on this to watch but what ever.
@bobabooey8367
@bobabooey8367 8 жыл бұрын
my resolution must be weak. What does it say on the chicken's body?
@MrBatcon
@MrBatcon 7 жыл бұрын
That's my line
@John-lw7bz
@John-lw7bz 7 жыл бұрын
But how does he tackle the salt? Was I not paying enough attention here? There shouldn't be any limit besides reasonable cost to profit of storing a unique salt of length n for a user. Or does everyone use completely shit salts?
@MarkPentler
@MarkPentler 7 жыл бұрын
joonas kaasik some don't even bother
@zwembadsniper6883
@zwembadsniper6883 7 жыл бұрын
joonas kaasik its bruteforce -.-
@John-lw7bz
@John-lw7bz 7 жыл бұрын
Zwembad Sniper yeah but a salt is basically a password on top of your password. if they are over 10 characters using special characters and so on. why on earth would they even be crackable. this is what I don't get. Ok, having googled I see a lot of difference in the strenght of salts
@HRRRRRDRRRRR
@HRRRRRDRRRRR 7 жыл бұрын
Just make your salt a random 20 character string, done.
@zwembadsniper6883
@zwembadsniper6883 7 жыл бұрын
I know what hashing is idiot. and it will always be buteforcable. The cost of the hashing method will only increase the time needed to bruteforce it thus it's usually useless to attempt to crack it.
@davidjohnson693
@davidjohnson693 11 жыл бұрын
Haha, that dude just trolled you.
@timlingard9739
@timlingard9739 11 жыл бұрын
He can't help it, why not tolerate it?
@safekeno
@safekeno 4 жыл бұрын
this guy sounds like a south park character
@unicodefox
@unicodefox 7 жыл бұрын
13:00 "NVIDEA"? It's nvidia
@agausmann
@agausmann 8 жыл бұрын
1:45 He totally stole that comic from xkcd
@FarSeenNomic
@FarSeenNomic 7 жыл бұрын
I would say stolen if he did it once, but I think he just reads it, seeing as there is more than one.
@Carter-dv4hz
@Carter-dv4hz Жыл бұрын
average password length = 7.2
@Funtasmia
@Funtasmia 11 жыл бұрын
38 here :P
@sublockdown
@sublockdown 11 жыл бұрын
Same here Thane... until he said something... and even now i do not notice it.... CANAIDIANSURFER and 9022920, if you are here for the info, you wont notice it at all.
@TheOnlyDeceiver
@TheOnlyDeceiver 11 жыл бұрын
Without those so called "pigs" you wouldn't have much at all.
@NZHacker1
@NZHacker1 8 жыл бұрын
I can make a 1 character password that will never be hacked and it's so simple
@Cleric775
@Cleric775 8 жыл бұрын
Let me guess. Non-ASCII.
@NZHacker1
@NZHacker1 8 жыл бұрын
yea but the best part is it will make it take forever
@Cleric775
@Cleric775 8 жыл бұрын
Let me guess. A binary that can be placed as a character, to represent it in lengths of 8 bits upto 128 bits or more.
@NZHacker1
@NZHacker1 8 жыл бұрын
like zalgo?
@nixietubes
@nixietubes 7 жыл бұрын
§
@ninokcp1701
@ninokcp1701 8 жыл бұрын
เรียนรู้ใหม่ที่ไม่เคยเห็น
@Rocosflyingdeliveryservice
@Rocosflyingdeliveryservice 11 жыл бұрын
a salt
@Oerg866
@Oerg866 11 жыл бұрын
XKCD is licensed under a Creative Commons Attribution-NonCommercial 2.5 License, which he did not break. Fuck off?
@Whatsthegeek
@Whatsthegeek 7 жыл бұрын
learn how people create passwords ? HAHAHA mine is a randomly generated string of numbers lower case and uppercase letters and symbols. and to be sure, its 15 caracters long xD
@nohnohbody
@nohnohbody 7 жыл бұрын
Whelp. I guess that rules out password 1-14 characters long and passwords 16+ characters long. Someone somewhere could do something with that. I'm not that that someone.
@yourpersonalspammer
@yourpersonalspammer 6 жыл бұрын
if he's running on a mac or windows system chances are the NSA already have his password or don't even need it. big companies like that have backdoors for these organizations. didn't snowden even talk about this sometime?
@GeekBlogTV
@GeekBlogTV 11 жыл бұрын
dont disregard otherwise good info because of the motivations of the researcher. maybe you were just being funny, because this was otherwise a great video.
@yourpersonalspammer
@yourpersonalspammer 6 жыл бұрын
it would be so easy to protect the users of website logins even if they had weak passwords. every user creates his account at some year, some day, some hour, some second. most websites actually already log this information. so what the website needs to do is take dumb-users password, i.e. "password" and attach that account-creation timestamp in a long-winded, strongly cyphered manner to the users password. all the user additionally has to do is select the date he created the account from a row of date-oriented dropdown-menus next to the password field. so he needs to get this information via email when he creates the account. that way the passwords would be utterly long, but not for the user who still just enters "password" while the website adds the strings of the coded timestamp to that weak password automatically after the date was selected (if the date attachment is made long winded and strongly cyphered). much less likely to get cracked in little time by dictionary approaches or brute force. EDIT: or even simler, just let the user choose an encryption algorithm himself by selecting a picture that resembles the encryption algorythm, while only the company knows which picture does what (i.e. klicking on a picture of a green tree, which adds an MD5 string, or a red ball which represents some other encryption system, etc). all he needs to remember is the picture he likes the most. alternatively the user could use a file as a key to upload, i.e. a picture from his computer, to serve as an encryption by using the file MD5-sum for instance. it really doesn't have to be complicated for the end-user, only the system behind it, what the website itself does with it should make it uncrackable.
@burchmaine2962
@burchmaine2962 8 жыл бұрын
HOW exactly do you become a hacker and not a script kiddie? Do you need to master programming languages?
@g79support10
@g79support10 8 жыл бұрын
not master it but defenitely be very at easy with it
@dialupdavid
@dialupdavid 8 жыл бұрын
+POTAT O You should have deep knowledge of C/C++ and take some courses in computer Architecture. Understand how data is stored, and how software actually works with the hardware. Then you can get into debugging and reverse engineering software. It takes many years or people to learn these kinds of things. College is a good start.
@theq4602
@theq4602 8 жыл бұрын
+ZeusGamingPro How much do the classes for kali cost? Could you recommend some videos on training someone to use it.
@hellterminator
@hellterminator 8 жыл бұрын
By not trying to become a hacker. If becoming a hacker is your goal, you'll end up following a path others have paved and will thereby inevitably become a script kiddie. A really good script kiddie perhaps but a script kiddie none the less. What you need is a genuine interest in computer science. If you have that, you will naturally acquire extensive _unique_ knowledge which will allow you to discover _new_ exploits.
@theq4602
@theq4602 8 жыл бұрын
***** damn.
@AaronSherman
@AaronSherman 11 жыл бұрын
Oh, BTW: If you want to completely avoid having this guy's approach ever work on your passwords, just take two common words and the name of the site. Split the site name in half and put the first half into the middle of the first word and the second half into the middle of the second word. Add one bit of punctuation after the nth letter (3-5 works out well) and you're done. "fiyotr;ewinubedy" is just "fire" + "windy" with "youtube" in it plus a semicolon, but strategies like his will choke on it
@GerbenWijnja
@GerbenWijnja 11 жыл бұрын
You mean his IQ is a 100 times higher? That's awesome. :-)
@smokeyninja9920
@smokeyninja9920 6 жыл бұрын
Makes me feel better about my password being AssP3%$6fRrOdw8, use it for all my accounts :D (not really but it's not half bad)
@EminemLovesGrapes
@EminemLovesGrapes 5 жыл бұрын
That's until the website you use stores it in plain text. Which happens more often than you'd think
@sethy2004
@sethy2004 12 жыл бұрын
hashed with a thalt?
@sent4dc
@sent4dc 6 жыл бұрын
Oh, man, this talk is so old. It's funny how far has everything advanced since 2011 in password security. Also the advent of cryptocurrency probably made him stop wasting his CPU cycles only on password cracking.
@SimonTangers
@SimonTangers 5 жыл бұрын
And another year after this comment, we wouldn't use our CPU cycles on crypto either!
@XxOwenDevinexX
@XxOwenDevinexX 11 жыл бұрын
He's probably 100x smarter than you.
@ForgottenKnight1
@ForgottenKnight1 9 жыл бұрын
A good password should be like this: It should NOT contain relevant words to any dictionary in any language. Use capital and small letters combined with numbers and special characters. It should be DIFFERENT from the passwords you already use for other things. Having a 'master' password is a very BAD idea. It should have at least 12 characters ( they usually recommend 6-8, but just go for 12 or more). Make it as RANDOM as you can think of. Do NOT tell it to anyone ( it's a password, damn it ! ) Don't write it down on your phone or computer or anywhere. Store it in your brain =)).
@FoodPvP
@FoodPvP 9 жыл бұрын
What about storing your passwords on an encrypted USB drive?
@alliefdxproductionservices5856
@alliefdxproductionservices5856 9 жыл бұрын
FoodPvP KeePass is pretty wonderful.
@FoodPvP
@FoodPvP 9 жыл бұрын
Alfie Pates you can hide your flashdrive under your bed tho
@alliefdxproductionservices5856
@alliefdxproductionservices5856 9 жыл бұрын
FoodPvP KeePass on a flashdrive under your bed?
@FoodPvP
@FoodPvP 9 жыл бұрын
Alfie Pates true but I don't really know what kee pass does
@wende2003ya
@wende2003ya 12 жыл бұрын
great
DEFCON 19: The Art of Trolling (w speaker)
41:32
Christiaan008
Рет қаралды 526 М.
DEFCON 16: Toying with Barcodes
44:26
Christiaan008
Рет қаралды 370 М.
Miracle Doctor Saves Blind Girl ❤️
00:59
Alan Chikin Chow
Рет қаралды 24 МЛН
[Vowel]물고기는 물에서 살아야 해🐟🤣Fish have to live in the water #funny
00:53
СҰЛТАН СҮЛЕЙМАНДАР | bayGUYS
24:46
bayGUYS
Рет қаралды 645 М.
DEFCON 14: The Making of atlas: Kiddie to Hacker in 5 Sleepless Nights
51:30
DEFCON 17: That Awesome Time I Was Sued For Two Billion Dollars
31:28
Christiaan008
Рет қаралды 1,6 МЛН
DEFCON 17: Making Fun of Your Malware
42:26
Christiaan008
Рет қаралды 247 М.
DEFCON 20: Bypassing Endpoint Security for $20 or Less
43:54
Christiaan008
Рет қаралды 265 М.
XL-Power Best For Audio Call 📞 Mobile 📱
0:42
Tech Official
Рет қаралды 772 М.
Wow AirPods
0:17
ARGEN
Рет қаралды 1,2 МЛН
Эволюция телефонов!
0:30
ТРЕНДИ ШОРТС
Рет қаралды 6 МЛН
How charged your battery?
0:14
V.A. show / Магика
Рет қаралды 1,9 МЛН