Passwords

Status
Not open for further replies.
Considering AM website users added:

p***y

cheater

horny

affair
 
So it actually exists - more than 120,000 people used "123456" as their password !

Amazing naivety !

yes but no. Most hackers don't attempt to bruteforce or dictionary attack websites, since they typically have lock out systems which prevent more than a few attempts. It is far more common to either use a keylogger or look for backend weaknesses (eg storing passwords with a weak hash or unsalted), and in both those cases you could have the strongest password in the world, I'm still getting it much faster than any bruteforce attack could.
 
Bruteforcing a live system is pointless and/or impossible as you have implied.

The problem of weak passwords is really two-fold:

- When a website is hacked (as many are) and its password database stolen (as many are), the weak passwords are the first to be cracked
- People who use a weak password on one system are likely to use the same weak password on another system

So feel free to use "123456" on blah.com safe in the knowledge that blah.com has a lock out system, but when blah.com's database is stolen and the weak passwords decrypted, you'd better hope that you didn't use the same password on foo.com or bar.com as well :)
 
Last edited:
Read our AFF credit card guides and start earning more points now.

AFF Supporters can remove this and all advertisements

Best stuff suggestion have seen is to use a cipher plus common stem with caps, numbers and characters

Eg.
EBay = fcb@@321
Twitter = uxj@@321
Ashley M = bti@@321

Fairly easy to remember and pretty difficult to break (cipher in this case is letter+1 - something more complicated might be recommended)
 
The best solution is to use a password manager program that a) generates long, random passwords for every website you use and b) remembers those passwords so you don't have to. Then all you have to do is remember the (hopefully secure) password that gets you into the password manager.
 
Bruteforcing a live system is pointless and/or impossible as you have implied.

The problem of weak passwords is really two-fold:

- When a website is hacked (as many are) and its password database stolen (as many are), the weak passwords are the first to be cracked

Not exactly true, depending on how the password is stored, the strength of the password is largely irrelevant. There are still many websites out there whom don't place any protection on it's password tables full stop. Strong / weak / known / hard to guess, no hashing and the password will be cracked in 2 seconds flat.

Sometimes people will run a hashing algorithm across passwords tables, use a weak algorithm such as MD5, and rainbow tables will take care of most of your hacking needs there. -> check out the following article on cracking MD5 passwords -> Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331†| Ars Technica

A strong algorithm such as SHA2-512, combined with a salt is pretty much the only way to store a password on the back end, and even then you need to make sure that the connection from the client all the way through to the database is encrypted, since if you are only doing the hashing on the database server and the connection between the website and the database is not encrypted, then again it's all for naught.



- People who use a weak password on one system are likely to use the same weak password on another system

So feel free to use "123456" on blah.com safe in the knowledge that blah.com has a lock out system, but when blah.com's database is stolen and the weak passwords decrypted, you'd better hope that you didn't use the same password on foo.com or bar.com as well :)


People whom use strong passwords are likely to reuse them on other systems as well. The strength of the password means little as to it's likelihood of been cracked. Probably the one password you want to keep secure (and different) over all else is your email password, since if your email account gets compromised it's very easy to then get other systems to send "reset password" requests.


The best solution is to use a password manager program that a) generates long, random passwords for every website you use and b) remembers those passwords so you don't have to. Then all you have to do is remember the (hopefully secure) password that gets you into the password manager.

And hope that the password manager is never hacked eg LastPass a couple of months ago.



Doing authentication correctly is actually a very complex topic, there are numerous ways to get into a system. A system designer needs to make sure they are all sealed, a cracker only needs to find one method which gets them in. There have been many attempts to make things secure via methods other than username and password combinations. From centrally managed tokens (eg Microsoft's Passbook) to bio-metric (eg fingerprint scanners, eye scanners) to duel factor (eg password and a physical device). All these methods have the advantages and disadvantages.

Of course never forget, no matter what authentication method you do, how much the systems can be improved, it will always be a human being which needs to use it, and that's the one part of the system that can never be upgraded.
 
The best solution is to use a password manager program that a) generates long, random passwords for every website you use and b) remembers those passwords so you don't have to. Then all you have to do is remember the (hopefully secure) password that gets you into the password manager.

My password manager can generate passwords such as:

%Mnc^Obqc*X$RDUw0e@M*66Zh!K%6ig5Fvh5zQupG@GU%CpUFxYhjf@8ViSpDp2VyEGGbTBpQB@lEzOg!AqgRNXL#D4NslubNLrr

Great piece of software IMHO.
 
My password manager can generate passwords such as:

%Mnc^Obqc*X$RDUw0e@M*66Zh!K%6ig5Fvh5zQupG@GU%CpUFxYhjf@8ViSpDp2VyEGGbTBpQB@lEzOg!AqgRNXL#D4NslubNLrr

Great piece of software IMHO.


I was going to write a piece on how to hack big passwords like this, but perhaps a better question is, how often do you replace your passwords with this program of yours?
There are numerous ways to obtain a persons password (some more stealthy than others), even massively long ones like this, so change passwords frequently is your best defense (short of enabling two factor authentication where possible)

Edit: Also if you want to remain secure, keep an eye out for "SSL errors" or "Certificate errors". That is typically your one and only sign that things might not be on the level all the way to the website which you are placing data into. If you don't mind bringing up certificate errors on a targets computer, SSL is exceptionally easy to hack into (I'm talking 5 minutes and regardless of how encrypted you think your connection is, I can read is all in plain text).
 
The best solution is to use a password manager program that a) generates long, random passwords for every website you use and b) remembers those passwords so you don't have to. Then all you have to do is remember the (hopefully secure) password that gets you into the password manager.

I look at password managers and can't help wonder how secure they actually are? Keeping all your eggs in 1 basket?
 
With most (if not all) password managers the passwords are all stored in a data file (encrypted of course) which you can back up as often and as many times as you see fit.
 
With most (if not all) password managers the passwords are all stored in a data file (encrypted of course) which you can back up as often and as many times as you see fit.

That I understand but my concern is how hard is it for someone to hack into it? Happy for an IT person to give their perspective.
 
I'll be honest and say I don't change my passwords as often as I should.
 
The perfect prey however I am guilty of this too
 
Issue with the password managers is they don't work with a number of Australian bank sites from what I have seen
 
Status
Not open for further replies.

Become an AFF member!

Join Australian Frequent Flyer (AFF) for free and unlock insider tips, exclusive deals, and global meetups with 65,000+ frequent flyers.

AFF members can also access our Frequent Flyer Training courses, and upgrade to Fast-track your way to expert traveller status and unlock even more exclusive discounts!

AFF forum abbreviations

Wondering about Y, J or any of the other abbreviations used on our forum?

Check out our guide to common AFF acronyms & abbreviations.
Back
Top