[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

How fast can your password be cracked?

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 145
Thread images: 45

File: 1406762898622.png (32KB, 959x526px) Image search: [Google]
1406762898622.png
32KB, 959x526px
http://www.passwordtester.net/
>>
that's brilliant op
but you need to add an email field while you're at it
>>
>For security reasons this site requires JavaScript. Sorry!

kek
>>
What do you mean by "your password"? Don't tell you you're still reusing passwords.
>>
>an undecillion years
>>
File: imblying.png (31KB, 1282x267px) Image search: [Google]
imblying.png
31KB, 1282x267px
>>43302448
>
>>
>>43302448
>password123

>152 days

le nigger face
>>
top fucking kek
I bet people on here will actually fall for this
>>
File: screenshot.54.png (13KB, 972x685px)
screenshot.54.png
13KB, 972x685px
password was niggers
>>
> op is a faggot
> 442 thousand years

kek
>>
>>43302545
>Password is "Example32"
>Change password to "Example23"
what a clever ruse! foiled again!
>>
>>43302448
standard password for me
>>
File: mypass.png (23KB, 944x542px) Image search: [Google]
mypass.png
23KB, 944x542px
Use full sentences.
>>
File: 1.jpg (96KB, 768x1280px) Image search: [Google]
1.jpg
96KB, 768x1280px
Lel
>>
>>43302448
Guess I'm safe for a while
>>
File: Password.png (12KB, 960x360px) Image search: [Google]
Password.png
12KB, 960x360px
It's my last name and two numbers.
>>
>>43302448
A nonillion years
>>
>>43302545
>implying most people wouldn't use a permutation of their password
>>
>>43302545
Even if I do enter my real password, they have no idea what service it's for or what username it's associated with.
>>
>>43302448
best I can get is
8 letter = 5 years... long enough for your average user - the NSA will walk through walls.
>>
>>43302662
christucker12
>>
>>43302448

>1,000 years
>164 years
>10,000 years
>137 thousand years
>>
>>43302754
they can go into your cookies. If your browser saves passwords (facebook, social media, twitter, etc.) they could get into those, or more seriously, bank accounts, credit card stuff. Highly doubtful that banking websites wouldn't have stronger security than that, however. Most likely you'll just have a spam message on your spacebook wall.
>>
>>43302545

I used this site like 4 years ago and literally nothing has ever happened to me.
>>
>>43302830
>not always using private browsing
>>
>doesn't take into account dictionary attacks
>arbitrary numbers
>helpful
>>
>in5t4ll-g3nto0 gets 2 million years
>>
File: Lel.png (19KB, 1197x564px) Image search: [Google]
Lel.png
19KB, 1197x564px
I broke it...
>>
>>43302754
Doesn't matter. Let's assume the service gets 10000 passwords entered into it. Then let's also assume 10% of them are real passwords people use. They create a dictionary of all the gathered passwords and then use it to crack the passwords on whatever service they attack. If you happen to be a user of that service (and assuming they have means to quickly parse the entire database and try the passwords against all the usernames in it), you will get cracked. If not, someone else probably will.
>>
>>43302582

nice meme!
>>
>>43302882
not using ghostry
>>
File: My real pass.jpg (54KB, 1201x556px) Image search: [Google]
My real pass.jpg
54KB, 1201x556px
>>43302911
>>
>>43302448
>35 quadrillion nonagintillion years
>?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????
>>
File: OH NO!.jpg (52KB, 1199x545px) Image search: [Google]
OH NO!.jpg
52KB, 1199x545px
>>43302933
>>
Days average desktop pc which is shit anyways. I bet anything under a few years could be cracked in hours using Amazon's cloud shit.
>>
>>43302919
I'll take my chances
>>
>>43302935
Actually, making a password out of obscure Unicode could probably be very secure, too bad most password feilds online only accept A-Z/0-9
>>
This is a great way to build a wordlist.

Also, the numbers are total bullshit. It doesn't even say what type of hash is being used to measure the computational complexity.
>>
File: passwordcracking.png (108KB, 1557x1168px) Image search: [Google]
passwordcracking.png
108KB, 1557x1168px
I'll leave this here.
>>
File: Screenshot_2014-07-30-20-49-08.png (158KB, 1080x1920px) Image search: [Google]
Screenshot_2014-07-30-20-49-08.png
158KB, 1080x1920px
NiggerFaggot for the win
>>
>WHATTHEFUCKDIDYOUJUSTSAYABOUTME

231 septillions year thanks god im secure
>>
>>43302470
>>43302545
Source is clean and no network calls were made while typing or leaving the page
>>
File: pepsi2.gif (1MB, 280x217px) Image search: [Google]
pepsi2.gif
1MB, 280x217px
>For security reasons this site requires JavaScript. Sorry!
>>
>>43302515
>>43302484
>>43303172
>>43302484
>being retarded
It's so the code is done client-side. That way it doesn't have to be sent to them and handled on their server.
>>
>>43302448
lel
>>
So I like how this password checker assumes whatever is trying to crack you pasword knows that it doesnt have symbols or numbers or letters if it doesnt have them for instance a 7 digit phone number, it claims could be cracked in under a second because it has 10 possible combinations for 7 digits. The problems with this:
first off those 7 digits by no means have to be numbers, so it should be about 52 posible combinations per digit and at the rate it suggests the computer would be going at that would actually take about 3 minutes (surprisingly fast still), not counting possible capitalization, the computer would check that last though so it doesn't really matter.

BUT thats not all It also no way for it to know that its a 7 digit long password, unless the program requires a 7 digit long password or some crap. If it has to figure out even how long it is then...
wow also 3 minutes that was a lot of math for nothing.

Last however is that thats assuming whatever you are trying to get into doesn't have a attempt lock out
>>
File: redneckreporting.png (27KB, 955x680px) Image search: [Google]
redneckreporting.png
27KB, 955x680px
type in 'nigger'
>commonly used
wat do?
>>
>>43303285
Change your password.
>>
File: password.png (19KB, 1071x635px) Image search: [Google]
password.png
19KB, 1071x635px
I use a sentence then throw a seemingly random number like the first 5 digits of e, then same special characters for good measure.

If a service doesn't let me use a password at least 20 characters in length, I don't use the service
>>
>>43303285
If you make it "niggers" it at least doesn't say instantly. It'd be cracked in 8 tenths of a second.
>>
0 seconds because you just gave some neckbeard sysadmin your password
>>
>>43303172
>>For security reasons this site requires JavaScript. Sorry!
Is it even possible to get away from Javascript these days? And why does everyone think its the scum of the earth? There needs to be client-side scripting to keep the client from taxing the server every time a slight adjustment to the site is made.

>>43303270
Fork it
>Last however is that thats assuming whatever you are trying to get into doesn't have a attempt lock out
>Autism
>BUT thats not all It also no way for it to know that its a 7 digit long password
Retarded autism. It's not supposed to crack your password, just compute how long it takes to crack, therefor it HAS to know how long it is. It's one of the parameters of the calculation.

>>43303329
You can achieve sufficient entropy in under 20 characters buttfucker.
>>
File: password.png (20KB, 929x545px) Image search: [Google]
password.png
20KB, 929x545px
Looking good
>>
>>43303097
>that layout
Oh shit nigger, what are you doing?
>>
File: cpissafefor2billionyears.png (18KB, 926x558px) Image search: [Google]
cpissafefor2billionyears.png
18KB, 926x558px
>>43303319
>>43303333
nah im good, this is my actual password:
>>
99 quadrillion nonagintillion years
>>
>>43302448
>type in pass
>botnet now has your password
>>
>nigger
>Common Password: In the top 980 most used passwords

Nigger is top 980 most used passwords. This is great.


https://www.youtube.com/watch?v=suePk14aqfo
>>
>>43303504
Sounds like something a nigger would find impressive
>>
wewt, muh key
>>
>>43303504
hitler is in about the top 3000.
>>
>>43303504
no one expects nigger to be used since it's so taboo

my wifi password is ihateniggers

no one will guess it
>>
>>43303370
that is not at all what i meant, I meant that a cracking program running on a computer would have no idea so would assume small and work its way up. Also it would run through a wordlist before checking numbers, which if you have ever run before you would know it takes a long ass time so ya I think this program vastly underestimates the strength of passwords.


Its not giving how long a computer would take to crack a password in almost any real life situation
>>
>>43303614
Give me your password and I will tell you how long it takes my rig to crack it
>>
File: Untitled123.jpg (105KB, 1244x725px) Image search: [Google]
Untitled123.jpg
105KB, 1244x725px
Good luck
>>
>>43303614
it's heavily pushing password managers
>yes goyim let me hold onto your bank passwords u can trust me honest
>>
How do I know it's not a honeypot?
>>
File: inf.jpg (70KB, 647x638px) Image search: [Google]
inf.jpg
70KB, 647x638px
>>
File: password.png (11KB, 874x395px) Image search: [Google]
password.png
11KB, 874x395px
Well here's one from a password generating script that I use.

}Y\?Hu(21~]u3+JCN.{tl,E>MstMOn!%
>>
hunter2
>>
>>43303698
Roll the dice faggot.
>>
>>43302545
>implying I didn't just use a similar pattern to the one I use to generate my real passwords.
>>
>>43303698
It is. for sure. nobody would go through the effort to make a page like that if it didn't generate income, and selling password lists generates income.
>>
>>43303768
I expected less cynicism from the board on 4chan that support open source the most.
>>
>>43303768
so does the huge advertising banner in the middle of the page..
>>
>>43303799
Given the opportunity anyone would cash in with the password list.
>>
>>43303820
not necessarily
really they have very little
just random combinations that may or may not be passwords to actual accounts that they nothing more about
lists of common passwords are abundant and can be found easily on the interwebs
>>
>>43302448

I just tried
>TestWord

and

>eEymoQlo

and got the exact same estimate

this is the biggest load of horse shit
>>
>>43303481
^This

I was gonna test my paypal password, then I came to my senses and tested something similar with the same amount of numbers and letters.
>>
File: the jetsons wont even crack it.png (8KB, 970x352px) Image search: [Google]
the jetsons wont even crack it.png
8KB, 970x352px
got nothin to worry about it seems
>>
>>43303887
It's calculated using brute-force. Not dictionary, no rainbow tables, just pure brute force. They would end up being the same.
>>
>>43303887
Two words together is just as good, if not better, a password than random characters.
>>
>>43303997

no

>>43303994

what do you mean by "end up being the same"

no one uses brute force these days
>>
>>43303789
Well give us the source
>>
File: absolutely halal.jpg (322KB, 531x471px) Image search: [Google]
absolutely halal.jpg
322KB, 531x471px
>>43303984
>the jetsons wont even crack it
Laughed like a faggot. Made my day anon.
>>
File: install gentoo.png (8KB, 968x359px) Image search: [Google]
install gentoo.png
8KB, 968x359px
>install gentoo
>>
>>43302597
"phrases", they're called passphrases.
>>
>>43304108
Allahu kekbar
>>
pw: "Iwanttogotothebathandtakeapiss"

It would take a desktop PC about 184 nonillion years to crack your password

top lek
>>
"hunter2" takes seven seconds.
>>
>>43303887
>he doesn't know how brute force works
>>
File: testpass.png (31KB, 973x818px) Image search: [Google]
testpass.png
31KB, 973x818px
Not bad for it being super simple.

I figure a dictionary force would probably break a simple date string (year in roman numerals) quickly though.
>>
It can't into non-standard characters.

? is always zero seconds, unless you add a letter or something.
>>
File: Screenshot (6).png (121KB, 1366x768px) Image search: [Google]
Screenshot (6).png
121KB, 1366x768px
Hello. ?
>>
TESTINGatest123$
>>
File: LELINSTALLGENTOO.png (35KB, 1142x880px) Image search: [Google]
LELINSTALLGENTOO.png
35KB, 1142x880px
i dont think lelinstallgentoo as a password is this safe but ok
>>
File: alec.png (79KB, 1440x875px) Image search: [Google]
alec.png
79KB, 1440x875px
"IloveitwhenAlecBaldwinfucksmyasshole"
>>
>>43305232
so then it may be ignoring the entropy from such things as well. I mean, can you even USE altcodes in passwords? I've never even tried. It makes sense, it would make the search space for each character fucking enormous.
>>
File: am i fugged.jpg (89KB, 692x800px) Image search: [Google]
am i fugged.jpg
89KB, 692x800px
I just use my cock.li e-mail account for passwords.
>>
>Your password would be cracked almost instantly
Apparently "password" isn't a good password
>>
>>43302448
it's shit
it needs to factor in exponential growth of computing power
seriously, then it would actually be useful information
>>
>34 septendecillion years
>>
>>43302448
>hey stupid anon, why don't you just type in all your password here, don't worry we are not collecting them
>>
File: 77017-19956-galactus.jpg (150KB, 400x639px) Image search: [Google]
77017-19956-galactus.jpg
150KB, 400x639px
>All these mortals thinking their passwords will be safe for 100 quintitripillionzerg years.

I can wait.
>>
>>43307094
It's offline javascript, you moron. Run it in a VM, cut your ethernet cable in half and type in a password similar to yours if you're that paranoid.
>>
>Common Password: In the top 10 most used passwords
Whatever, it's not like people actually check these things.
>>
>>43307146
>butthurt op
>>
>>43307173
Fantastic argument there.
>>
kyon-kun denwa
>>
>>43302448
shit doesn't even work right
> enter password with letters and numbers

> length: 8 characters
correct

> character combinations: 62
correct, but the guesser can't assume this

> possible combinations: 214 trillion
what? no
62^8 = 218340105584896

great software, OP
>>
% pwgen -1sy 16 1


>It would take a desktop PC about 164 trillion years to crack your password
I'm OK
>>
>>43302448
151 billion years
I think I'll be safe for now.
>>
>405 septillion sexagintillion years
>>
% pwgen -1sy 256 1


>It would take a desktop PC about Infinity years to crack your password
Lies.
>>
>>43302448
>A trillion years
>Length: 15 characters
>Character Combinations: 96
>Calculations Per Second: 10 billion
>Possible Combinations: 542 octillion
>>
>>43303604
>hey anon thanks for letting me come over, by the way can I have your wifi password?
>>
File: hue.png (18KB, 865x536px) Image search: [Google]
hue.png
18KB, 865x536px
Always used and always will use a password using my first and last name + my phone number.
firstnamePhoneNumberlastname

Easy to memorize, and very secure.
>>
>>43307966
extremely insecure from social engineering however
>>
>>43307983
Well, if they can actualy associate that the password is actualy my real first and last name then yes.
The phone number is long dead though, last time I used it was 10 years ago.
>>
>>43302448
>inb4 this is a honeypot for collecting passwords
>>
>>43308018
>actualy saving cookies
>not entering the website in incognito mode
>>
couldn't the owners of this site use it to build a huge database of passwords and their hashes?
>>
>>43308086
>implying things like this dont already exist
>>
File: pass.png (24KB, 1198x564px) Image search: [Google]
pass.png
24KB, 1198x564px
wouldyouliketomakingfuckberzerker
>>
>just hold down the A key
>It would take a desktop PC about Infinity years to crack your password
k
>>
File: passtest.png (24KB, 968x543px) Image search: [Google]
passtest.png
24KB, 968x543px
what is this password site, some kind of password honeytrap for tards?

thats the result for symbols letters and numbers, kek
>>
Fuck all y'all
>>
I don't trust that site.
>>
File: .png (132KB, 1304x919px) Image search: [Google]
.png
132KB, 1304x919px
It crashed.
>>
> 540 years
> 816 million years
> 0.0001 seconds
> 23 years
>>
File: bascart man.gif (2MB, 192x144px) Image search: [Google]
bascart man.gif
2MB, 192x144px
>>43307821

>not having a quarantine network behind a cheapo wireless router for when company comes over
>>
>>43307821
>no
>>
>>43308405
Bosse
>>
Can somebody explain to me why an 18 number password takes 3 years but a 13 letter password takes 7 years? Hoes this algorithm know before it starts cracking whether I use letters or numbers? Why doesn't it just know my password already and take 0 seconds? or are you going to tell me that it first checks for passwords consisting solely of numbers until the 18th place and then starts over at the beginning, but this time with only letters, then letters and numbers and then special signs? what a shitty algorithm!
>>
>>43309952
*Does this algorithm
>>
>>43309952
I am in no way an expert on this topic.

It has something to do with the unpredictability of the characters, which is known as "entropy." I'm not sure how it's calculated but usually a password that is quite linear such as "12121212" is highly predictable, whilst "921bvq2B234623B^@6235^)*#!~n8[5124b56a46w$%^N#45!@#$^b1234567b" is utter nonsense that my hand generated with no intention of hitting certain keys.
>>
>>43302448

>javascript

Seems legit :^)
>>
File: niggers-tongue-my-anus.jpg (37KB, 513x299px) Image search: [Google]
niggers-tongue-my-anus.jpg
37KB, 513x299px
>>43302448
>It would take a desktop PC about 7 quintillion years to crack your password
>>
File: huehuehue.png (129KB, 350x370px) Image search: [Google]
huehuehue.png
129KB, 350x370px
>>43310256
This means my botnet consisting of 7 quintillion desktop computers would only need a single year. Weak password, brah
>>
File: Screenshot - 310714 - 21:17:47.png (15KB, 787x232px) Image search: [Google]
Screenshot - 310714 - 21:17:47.png
15KB, 787x232px
I just used the site's disclaimer.
>>
>My password for work stuff is the first 30 digits of pi

Easy to remember and there's no way anyone's going to guess that.
>>
File: rQz6euw.png (280KB, 640x522px) Image search: [Google]
rQz6euw.png
280KB, 640x522px
Childhood video game character plus my school ID nimber from high school (7 numbers long) along with my first name

21 characters long

142 quadrillion years

I feel plenty safe
>>
File: Capture.png (5KB, 869x164px) Image search: [Google]
Capture.png
5KB, 869x164px
ireallyneedtotakeashitniggah

Niggah that needs to take a shit is safe.
>>
>>43302448
>676 million nonagintillion years
It's my login password for 4chan
>>
File: 1377806569113.jpg (98KB, 600x900px) Image search: [Google]
1377806569113.jpg
98KB, 600x900px
>>43303614
>I think this program vastly underestimates the strength of passwords.
Don't you mean overestimate?

Also
> I meant that a cracking program running on a computer would have no idea so would assume small and work its way up.
Irrelevant. The keyspace grows exponentially. The keyspace of all 1-long passwords + all 2-long passwords + ... + all n long passwords is completely dominated by the keyspace of the longest possible password.
Thread posts: 145
Thread images: 45


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.