forum

Is your password safe?

posted
Total Posts
32
show more
Manysi

Railey2 wrote:

I appreciate passwords being changed to things that somehow honor my name.
ehh.. Why?
Dusalty
Let's make new password. Our password is: "HonorRailey2". Instead of pressing the correct keys when writing the password let's press the ones above them (if there's no keys above let's press keys from bottom row). Now our password is: "Y9nh94¤q8o36z"

Flanster
Emayecue
My passwords for sites like

http://www.superduperfunnycutepicturelikethislink.com would probably be breakable in 1 to 2 seconds on a Commodore 64

But my password for financial sites and things of that nature, I would consider pretty safe, although I could perhaps up them a notch, there was once upon a time where they were considered very solid, but I think as things change, they probably lost some strenght.

I'll look into renewing those shortly.

Wuxo
All my passwords are from 12+25 chars...
It have both lowercase and capitals, numbers and special characters.
Pretty safe I guess
shilawen
I just got prompted to change my osu password. Is osu storing our password in plain text? There shouldn't be a way to check a passwords strength retroactively after its been salted and hashed...
Rilene

Railey2 wrote:

30 pw-length - only numbers, is unnecessarily long, but it surely does its job. Still, it is overkill and I wouldn't take it just for reasons of practicability. It has 1,111,111,111,111,111,111,111,111,111,110 possible combinations if I am not mistaken, so you can be sure that nobody is every going to guess that one. You can also be reasonably sure that you will forget it or scramble up the numbers. Or that you have to spend a decent amount of time to learn it. In my opinion its not worth the effort. You can be safe with 9 letters already, if you go right about it.
Well, it's the password that I can easily remember and holy, that's alot of possible combination needed.

How fast is it to crack a password like "12345678"?
Less than 5 seconds or almost instanteous?
Shohei Ohtani
you guys should post your passwords in this thread and I'll evaluate if they're strong or not
Bara-
My client got blocked cause the password was too weak >>____>>
6 letters, have changed it now xD
Lagel
I hope so...
Flanster

Rilene wrote:

Railey2 wrote:

30 pw-length - only numbers, is unnecessarily long, but it surely does its job. Still, it is overkill and I wouldn't take it just for reasons of practicability. It has 1,111,111,111,111,111,111,111,111,111,110 possible combinations if I am not mistaken, so you can be sure that nobody is every going to guess that one. You can also be reasonably sure that you will forget it or scramble up the numbers. Or that you have to spend a decent amount of time to learn it. In my opinion its not worth the effort. You can be safe with 9 letters already, if you go right about it.
Well, it's the password that I can easily remember and holy, that's alot of possible combination needed.

How fast is it to crack a password like "12345678"?
Less than 5 seconds or almost instanteous?
Immediately lmao.
Rilene
12345678 is the worst password then in terms of security but best password in terms of memorization

still curious about 111222333444555666777888999 password though
Flanster
The combinations for that long password are too damn high but its still not safe due to its structure, can be brute forced.
Rilene
Oh yeah, numbers only have only 10 combination, 27^10 but.. Yeah, brute forcing.

Then my computer teacher told me wrong about leet speak and using words from dictionary in password.

If password has letters, capital letters and numbers and at least 30 digits... 30^62... 3.81520424E+91, well.. How many billion and trillions is that? Or just in normal numbers.
Stefan
Good that we got pen and paper to notice your passwords. Lesson is pretty boring atm so it's a good chance to make some changes.
Flanster

Rilene wrote:

Oh yeah, numbers only have only 10 combination, 27^10 but.. Yeah, brute forcing.

Then my computer teacher told me wrong about leet speak and using words from dictionary in password.

If password has letters, capital letters and numbers and at least 30 digits... 30^62... 3.81520424E+91, well.. How many billion and trillions is that? Or just in normal numbers.
38152042400000000000000000000000000000000000000000000000000000000000000000000000000000000000

..not much!
Gumpy

I should probably improve my passwords soon.
Rilene

LoliFlan wrote:

38,152,042,400,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000
oh my gosh
A Medic

Rilene wrote:

12345678 is the worst password then in terms of security but best password in terms of memorization

still curious about 111222333444555666777888999 password though
Would be cracked almost instantly

Not long because I found this in one of my bad lists.

Also I believe this was in one of the default wordlists you can get with kali

Rilene

A Medic wrote:

Rilene wrote:

12345678 is the worst password then in terms of security but best password in terms of memorization

still curious about 111222333444555666777888999 password though
Would be cracked almost instantly

Not long because I found this in one of my bad lists.

Also I believe this was in one of the default wordlists you can get with kali

wow, then plain numeric password is a bad password
sottovoce
Does anyone bother to brute force passwords? I doubt it, you are very unlikely to be targetted like this, the attacker has to specifically pick you, know your account name, and circumvent whatever measures are put in place to stop it. For example, you'll often be locked out of an account after failing the password several times in a row. On top of this, it takes a massive amount of computing power to do efficiently.
Unless you have reason to suspect you might be targetted, I wouldn't spend even 1 second worrying about being bruteforced. Someone better REALLY want to play on your osu! account. ;)

You're far more likely to fall victim to a database leak or a keylogger.
You can check if your information has been leaked here: https://haveibeenpwned.com/
Rilene

sottovoce wrote:

Does anyone bother to brute force passwords? I doubt it, you are very unlikely to be targetted like this, the attacker has to specifically pick you, know your account name, and circumvent whatever measures are put in place to stop it. For example, you'll often be locked out of an account after failing the password several times in a row. On top of this, it takes a massive amount of computing power to do efficiently.
Unless you have reason to suspect you might be targetted, I wouldn't spend even 1 second worrying about being bruteforced. Someone better REALLY want to play on your osu! account. ;)

You're far more likely to fall victim to a database leak or a keylogger.
You can check if your information has been leaked here: https://haveibeenpwned.com/
Being targetted on osu! is unlikely but if you are a celebrity on social networks or you have a extremely sensitive and important data.
They will likely to hack you and brute-forcing hacking works better on offline, by that it means... Computer directly to computer, not computer to computer over the internet.
Please sign in to reply.

New reply