短密碼真的那麼不安全嗎?

超級使用者讀者user31073很好奇他是否真的應該注意那些簡短的密碼警告:...

短密碼真的那麼不安全嗎? You know the drill: use a long and varied password, don’t use the same password twice, use a different password for every site. Is using a short password really that dangerous? Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-driven grouping of Q&A web sites.

問題

超級使用者讀者user31073很好奇他是否真的應該注意那些簡短的密碼警告:

Using systems like TrueCrypt, when I have to define a new password I am often informed that using a short password is insecure and “very easy” to break by brute-force.

I always use passwords of 8 characters in length, which are not based on dictionary words, which c***ists of characters from the set A-Z, a-z, 0-9

I.e. I use password like sDvE98f1

How easy is it to crack such a password by brute-force? I.e. how fast.

I know it heavily depends on the hardware but maybe someone could give me an estimate how long it would take to do this on a dual core with 2GHZ or whatever to have a frame of reference for the hardware.

To brute-force attack such a password one needs not only to cycle through all combinati*** but also try to decrypt with each guessed password which also needs some time.

Also, is there some software to brute-force hack TrueCrypt because I want to try to brute-force crack my own password to see how long it takes if it is really that “very easy”.

短隨機字元密碼真的有風險嗎?

答案

超級使用者貢獻者Josh K.強調了攻擊者需要什麼:

If the attacker can gain access to the password hash it is often very easy to brute force since it simply entails hashing passwords until the hashes match.

The hash “strength” is dependent on how the password is stored. A MD5 hash might take less time to generate then a SHA-512 hash.

Windows used to (and may still, I don’t know) store passwords in a LM hash format, which uppercased the password and split it into two 7 character chunks which were then hashed. If you had a 15 character password it wouldn’t matter because it only stored the first 14 characters, and it was easy to brute force because you weren’t brute forcing a 14 character password, you were brute forcing two 7 character passwords.

If you feel the need, download a program such as John The Ripper or Cain & Abel (links withheld) and test it.

I recall being able to generate 200,000 hashes a second for an LM hash. Depending on how Truecrypt stores the hash, and if it can be retrieved from a locked volume, it could take more or less time.

Brute force attacks are often used when the attacker has a large number of hashes to go through. After running through a common dictionary they will often start weeding passwords out with common brute force attacks. Numbered passwords up to ten, extended alpha and numeric, alphanumeric and common symbols, alphanumeric and extended symbols. Depending on the goal of the attack it can lead with varying success rates. Attempting to compromise the security of one account in particular is often not the goal.

另一位撰稿人Phoshi進一步闡述了這一觀點:

Brute-Force is not a viable attack, pretty much ever. If the attacker knows nothing about your password, he isn’t getting it through brute-force this side of 2020. This may change in the future, as hardware advances (For example, one could use all however-many-it-has-now cores on an i7, massively speeding up the process (Still talking years, though))

If you want to be -super- secure, stick an extended-ascii symbol in there (Hold alt, use the numpad to type in a number larger than 255). Doing that pretty much assures that a plain brute-force is useless.

You should be concerned about potential flaws in truecrypt’s encryption algorithm, which could make finding a password much easier, and of course, the most complex password in the world is useless if the machine you’re using it on is compromised.

我們可以將Phoshi的回答解釋為“暴力不是一個可行的攻擊,當使用複雜的當前一代加密時,幾乎從來沒有”。

正如我們在最近的文章中強調的,暴力攻擊解釋了:所有的加密都是易受攻擊的,加密方案老化,硬體能力增加,所以過去的硬目標(如微軟的NTLM密碼加密演算法)在幾個小時內就可以被擊敗只是時間問題。


有什麼要補充的解釋嗎?在評論中發出聲音。想從其他精通技術的Stack Exchange使用者那裡瞭解更多答案嗎?在這裡檢視完整的討論主題。

  • 發表於 2021-04-11 18:12
  • 閱讀 ( 33 )
  • 分類:網際網路

你可能感興趣的文章

iphonex上的faceid有用嗎?

...Face ID只讓我失敗了幾次,即使這樣,我也從來不用輸入密碼,因為感測器在第二次透過時重新掃描並授權了我。 ...

  • 發佈於 2021-03-12 06:20
  • 閲讀 ( 58 )

你的樹莓皮安全嗎?

... 首先,您應該更改Pi的預設使用者名稱和密碼。如果不這樣做,任何人都可以透過SSH遠端連線到您。他們用預設憑據登入不會花很長時間。他們甚至可能更改使用者名稱和密碼,以防止您再次連線到Pi! ...

  • 發佈於 2021-03-13 03:37
  • 閲讀 ( 62 )

如何恢復excelvba密碼

被密碼保護的VBA文件卡住了?下面是如何撬鎖。 ...

  • 發佈於 2021-03-14 06:34
  • 閲讀 ( 49 )

你真的需要拋棄麥基普的四個原因

...MacKeeper使用者資料。大約1300萬個使用者名稱、許可證、密碼雜湊和公共IP地址可供任何人查詢和濫用。 ...

  • 發佈於 2021-03-14 17:42
  • 閲讀 ( 45 )

默默無聞的安全性比開源軟體安全嗎?

... 默默無聞的安全性本身並不能為系統提供安全性。在密碼學的世界裡,這被視為一個給定的條件。Kerckhoff的原理認為,即使密碼機制落入敵人手中,密碼系統也應該是安全的。這個原則可以追溯到19世紀末。 ...

  • 發佈於 2021-03-14 23:58
  • 閲讀 ( 46 )

用以下6個簡單的技巧保護你的facebook

...戶,並清理這造成的損害。使用與其他網站相同的密碼或短密碼是個壞主意。 ...

  • 發佈於 2021-03-15 05:23
  • 閲讀 ( 42 )

克服安全疲勞和保持安全線上的3種方法

...還有很多事情你需要記住去做。您需要批准更新、輸入新密碼、執行病毒掃描、確保備份檔案等等。 ...

  • 發佈於 2021-03-17 04:44
  • 閲讀 ( 34 )

受雅虎影響!破壞?為什麼不試試protonmail?

... 第一個密碼允許您登入到伺服器,就像任何傳統的登入方法一樣。一旦您輸入了“解密郵箱”金鑰,伺服器就會解密並裝載您的郵箱。沒有這個,你的郵箱就沒用了。 ...

  • 發佈於 2021-03-17 07:04
  • 閲讀 ( 63 )

檢查網際網路連線安全的5種方法

... 您的網路是否安全,不受密碼駭客攻擊?如果您不確定,請重複檢查路由器使用的密碼。您需要檢查兩個:訪問網路的密碼和對路由器本身進行管理控制的密碼。 ...

  • 發佈於 2021-03-18 17:27
  • 閲讀 ( 50 )

linux真的對病毒和惡意軟體免疫嗎?事實是這樣的

...,讓某人可以訪問您儲存的資料或您鍵入的重要憑據,如密碼和信用卡號碼。 ...

  • 發佈於 2021-03-19 13:49
  • 閲讀 ( 57 )
dr036578
dr036578

0 篇文章

作家榜

  1. admin 0 文章
  2. 孫小欽 0 文章
  3. JVhby0 0 文章
  4. fvpvzrr 0 文章
  5. 0sus8kksc 0 文章
  6. zsfn1903 0 文章
  7. w91395898 0 文章
  8. SuperQueen123 0 文章

相關推薦