Tuesday, March 27, 2007

Please read:

The following is not my post but it is from:
One Man's Blog
OneMansBlog.com is Copyright © 2006-2007 by John Pozadzides.
This work is licensed under a Creative Commons Attribution 2.5 License.

Since I found it via digg.com, I would just blog it from there, but for some reason my digg account and blogger are just not getting along quite the same ever since I switched over to the beta at blogger (now the standard). But, I truly feel this is something that everyone should know.

How I’d Hack Your Weak Passwords

Digg This! (1489 Diggs, 140 comments) • Save to del.icio.us (186 saves, tagged: security password hacking) • Technorati: 17 links to this item • Add to Technorati Favorites! • Google Bookmark This • Add to Yahoo MyWeb2 • Add a comment

Hello DIGG visitors! Thanks for stopping by. As you may have noticed, the server is under a little bit of strain at the moment. It might have something to do with the 5,000 visitors per hour that are stopping by. :-)

The page you are viewing is a static HTML document so that it can handle the load, but a lot of people are trying to click through to other pages on the site. (Thanks for your interest by the way!)

If you try to visit another article but get a Wordpress database error you may want to try reloading it a few times. Or, if I may suggest... if you'll open the article in another window and check on it in a few hours the server should catch up and you can refresh and read the page later. Thanks again!!!

User LoginIf you invited me to try and crack your password, you know the one that you use over and over for like every web page you visit, how many guesses would it take before I got it?

Let’s see… here is my top 10 list. I can obtain most of this information much easier than you think, then I might just be able to get into your e-mail, computer, or online banking. After all, if I get into one I’ll probably get into all of them.

1. Your partner, child, or pet’s name, possibly followed by a 0 or 1 (because they’re always making you use a number, aren’t they?)
2. The last 4 digits of your social security number.
3. 123 or 1234 or 123456.
4. “password”
5. Your city, or college, football team name.
6. Date of birth - yours, your partner’s or your child’s.
7. “god”
8. “letmein”
9. “money”
10. “love”

Statistically speaking that should probably cover about 20% of you. But don’t worry. If I didn’t get it yet it will probably only take a few more minutes before I do…

Hackers, and I’m not talking about the ethical kind, have developed a whole range of tools to get at your personal data. And the main impediment standing between your information remaining safe, or leaking out, is the password you choose. (Ironically, the best protection people have is usually the one they take least seriously.)

One of the simplest ways to gain access to your information is through the use of a Brute Force Attack. This is accomplished when a hacker uses a specially written piece of software to attempt to log into a site using your credentials. Insecure.org has a list of the Top 10 FREE Password Crackers right here.

So, how would one use this process to actually breach your personal security? Simple. Follow my logic:

* You probably use the same password for lots of stuff right?
* Some sites you access such as your Bank or work VPN probably have pretty decent security, so I’m not going to attack them.
* However, other sites like the Hallmark e-mail greeting cards site, an online forum you frequent, or an e-commerce site you’ve shopped at might not be as well prepared. So those are the ones I’d work on.
* So, all we have to do now is unleash Brutus, wwwhack, or THC Hydra on their server with instructions to try say 10,000 (or 100,000 - whatever makes you happy) different usernames and passwords as fast as possible.
* Once we’ve got several login+password pairings we can then go back and test them on targeted sites.
* But wait… How do I know which bank you use and what your login ID is for the sites you frequent? All those cookies are simply stored, unencrypted and nicely named, in your Web browser’s cache. (Read this post to remedy that problem.)

And how fast could this be done? Well, that depends on three main things, the length and complexity of your password, the speed of the hacker’s computer, and the speed of the hacker’s Internet connection.

Assuming the hacker has a reasonably fast connection and PC here is an estimate of the amount of time it would take to generate every possible combination of passwords for a given number of characters. After generating the list it’s just a matter of time before the computer runs through all the possibilities - or gets shut down trying.

Pay particular attention to the difference between using only lowercase characters and using all possible characters (uppercase, lowercase, and special characters - like @#$%^&*). Adding just one capital letter and one asterisk would change the processing time for an 8 character password from 2.4 days to 2.1 centuries.

Password Length - All Characters - Only Lowercase
  • 3 characters - 0.86 seconds - 0.02 seconds
  • 4 characters - 1.36 minutes - 046 seconds
  • 5 characters - 2.15 hours - 11.9 seconds
  • 6 characters - 8.51 days - 5.15 minutes
  • 7 characters - 2.21 years - 2.23 hours
  • 8 characters - 2.23 hours - 2.42 days
  • 9 characters - 20 millennia - 2.07 months
  • 10 characters - 1,899 millennia - 4.48 years
  • 11 characters - 180,365 millennia - 1.16 centuries
  • 12 characters - 17,184,705 millennia - 3.03 millennia
  • 13 characters - 1,627,797,068 millennia - 78.7 millennia
  • 14 characters - 154,640,721,434 millennia - 2,046 millennia

Remember, these are just for an average computer, and these assume you aren’t using any word in the dictionary. If Google put their computer to work on it they’d finish about 1,000 times faster.

Now, I could go on for hours and hours more about all sorts of ways to compromise your security and generally make your life miserable - but 95% of those methods begin with compromising your weak password. So, why not just protect yourself from the start and sleep better at night?

Believe me, I understand the need to choose passwords that are memorable. But if you’re going to do that how about using something that no one is ever going to guess AND doesn’t contain any common word or phrase in it.

Here are some password tips:

1. Randomly substitute numbers for letters that look similar. The letter ‘o’ becomes the number ‘0′, or even better an ‘@’ or ‘*’. (i.e. - m0d3ltf0rd… like modelTford)
2. Randomly throw in capital letters (i.e. - Mod3lTF0rd)
3. Think of something you were attached to when you were younger, but DON’T CHOOSE A PERSON’S NAME! Every name plus every word in the dictionary will fail under a simple brute force attack.
4. Maybe a place you loved, or a specific car, an attraction from a vacation, or a favorite restaurant?
5. You really need to have different username / password combinations for everything. Remember, the technique is to break into anything you access just to figure out your standard password, then compromise everything else. This doesn’t work if you don’t use the same password everywhere.
6. Since it can be difficult to remember a ton of passwords, I recommend using Roboform. It will store all of your passwords in an encrypted format and allow you to use just one master password to access all of them. It will also automatically fill in forms on Web pages, and you can even get versions that allow you to take your password list with you on your PDA, phone or a USB key.
7. Once you’ve thought of a password, try Microsoft’s password strength tester to find out how secure it is.

Another thing to keep in mind is that some of the passwords you think matter least actually matter most. For example, some people think that the password to their e-mail box isn’t important because “I don’t get anything sensitive there.” Well, that e-mail box is probably connected to your online banking account. If I can compromise it then I can log into the Bank’s Web site and tell it I’ve forgotten my password to have it e-mailed to me. Now, what were you saying about it not being important?

Often times people also reason that all of their passwords and logins are stored on their computer at home, which is save behind a router or firewall device. Of course, they’ve never bothered to change the default password on that device, so someone could drive up and park near the house, use a laptop to breach the wireless network and then try passwords from this list until they gain control of your network - after which time they will own you!

Now I realize that every day we encounter people who over-exagerate points in order to move us to action, but trust me this is not one of those times. There are 50 other ways you can be compromised and punished for using weak passwords that I haven’t even mentioned.

I also realize that most people just don’t care about all this until it’s too late and they’ve learned a very hard lesson. But why don’t you do me, and yourself, a favor and take a little action to strengthen your passwords and let me know that all the time I spent on this article wasn’t completely in vain.

Please, be safe. It’s a jungle out there.

Sunday, March 18, 2007

Back from the Bahamas

Its never easy to leave, but we had a wonderful time down in Abaco. Compared to our last trip down to the Bahamas, this trip was much more low key. Last year we went down to Treasure Cay with Melanie's folks and her brother, Andrew. It was their first trip to the Bahamas, so we spent a lot of the trip exploring the island. This time, Mel and I simply kicked back and relaxed. There were a few days of exploring, but it wasn't off to the typical tourist spots. My Dad took Mel and I out for her first bonefishing experience. Several months ago, my Dad picked up a new bonefish skiff so he could enjoy his favorite sport more often. Bonefishing is a unique sport spent out on the flats in the Bahamas. The flats are sections of the ocean where during low tide the water level drops to around a foot deep. When the water drops like this, the bonefish swim up to hunt for crabs and other food. The tricky part is the flats are by no means small sections of land, they can stretch for several hundred yard and there is no particular pattern to where the bonefish will be. In a large part, bonefishing is much more like hunting than fishing, because you really have to try and track them down. I'll be posting some of our trips out to the flats later when I have a chance.
The rest of the trip was spent on the beach and enjoying the company of my parents. By the time we arrived, they had already spent a month down in the Bahamas and loving every moment of it. I have a strong feeling that from now on, I will be hard pressed to locate my parents anywhere near Montana during January from now on. They will be leaving on this upcoming Tuesday to travel up the east coast and visit with friend for a few weeks, and will then return to Treasure Cay for a few week more after that. Our return trip from the Bahamas always seems to make it that much harder to leave, and this last time was no exception. Along with a two and a half hour delayed flight from the island, our bags managed to miss the flight to Florida. From experience, we have learned that its best to arrive a day earlier before traveling to the Bahamas, and fly out a day later once you return. We had prepared for the delays both going to and coming from the island, but the missing bag was a curve ball. After we cleared immigration, we went down stairs to claim our bag and move through customs. That is when we discovered our bag, along with several others from the flight, had not made it over. That was a little upsetting, but they told us to call the 800 number on our ticket jacket. After fifteen minutes on hold, Melanie finally got in touch with someone on the phone. By this point we were already in the shuttle in transit to our hotel. That is when we found out that claims had to be made in person at the airport, and could not be taken over the phone. So we had the distinct pleasure of traveling back to the airport to a different terminal to place our claim. From there on out things did start to pick up, but it really was an unwanted headache. They did find out bag, and it was dropped of around five hours after we got home. Well, I should finish this off for now, but I will post a few more details about the trip later. Until then, cheers!

Saturday, March 10, 2007

W4: Pluses and Minuses

Decided to steal a page from my wife, and submit a quit posting while we wait for our flight. Just want to thank Ft. Lauderdale Airport for having the common decency of providing free WiFi. Seriously, does anyone ever pay for WiFi at other airports unless you absolutely have to, and I for one have never access that bad. But, back to the heart of things.
This past week of training had its ups and downs, I had a good week based of the intensity of the work outs I completed, but I did poorly based off how many days I worked out. I will have to improve on that. I started the week of with a 5k run, which I finished in just over 30 min, which is good, but I will need to shave some more time off that. The big work out came this past Thursday, when I decided to give a litmus test to my progress so far. I started out with a 10 mile bike ride, that I finished in around 45 minutes. I basically rode a modified circuit and after I returned back to the house I kicked off the running section of my workout. I grabbed Kiera, and 5 minutes after finishing my bike ride I was back on the road for a 3 mile run. I clocked in at 30 minutes for that run, and I was feeling the burn after that work out.
This next week will be interesting to see how Melanie and I will be able to adjust our training to a new environment. But, all and all it should be pretty fun, besides you really can't complain about running on the beach. That's all for now.

Sunday, March 04, 2007

W3: Condition Sore

After three weeks of training, I'm starting to feel it, and I am sore. I didn't push myself as hard as I would have liked, I probably should have gone out on some of the days I took off, but I still have time to make up for that. As payback for that slacking, I may have over done it today. I started off with a bike ride down to the store to pick up some breakfast supplies. That would have been a moderate workout for the day, but I wasn't finished quite yet. Later in the afternoon Mel convinced me to head out with her for a run with Kiera. We did a 3.2 mile run, after which my body let me know it wasn't too happy with me. But this will pass, and I better get used to it if I want to be in proper shape for when the triathlon rolls around.

Thursday, March 01, 2007

Night out for Hockey







Second row! Not too shabby.