~=8 Character Passwords Are Dead=~
New benchmark from the Hashcat Team shows a 2080Ti GPU passing 100 Billion password guesses per second (NTLM hash).
This means that the entire keyspace, or every possible combination of:
...of an 8 character password can be guessed in:
(8x 2080Ti GPUs against NTLM Windows hash)
@tinker those were never good passwords to begin with, but how do you counter this without changing password habits? after all moore's law will make longer and longer passwords crackable
has some good bits in regard to that!
@DJWalnut - I recommend passphrases of five words. Easy for a person to remember, harder to crack.
Ideally use a password manager and inplement multifactor authentication every where you can.
@piggo - This is the attempt rate against NTLM hashes in an offline attack. So you can attempt 800 Billion guesses per secone in the setup I described. You will go through every possible combination of an 8 character password (using characters that are found on standard keyboards) in less than 2 and a half hours.
@tinker Isn't NTLM hashes very weak, fast to compute?
With a traditional hash function, along with some reasonable number of rounds of PBKDF2 and 8 character passwords are still definitely viable.
@loke - Don’t think so... even slow hashes may take days at maximum. Still within an attacker’s time budget. Benchmarks will tell for certain though!
With the right number of iterations you can make the hashing take any time you want. If you set it to take a significant fraction of a second you can make even shorter passwords safe.
@pfm - Here is hashcat’s post: https://twitter.com/hashcat/status/1095807014079512579?s=21 - You can also check out the hashcat forums at https://hashcat.net/forum/
@Cedara - Here is hashcat’s post: https://twitter.com/hashcat/status/1095807014079512579?s=21 - You can also check out the hashcat forums at https://hashcat.net/forum/
@fuyuhikodate - Here is hashcat’s post: https://twitter.com/hashcat/status/1095807014079512579?s=21 - You can also check out the hashcat forums at https://hashcat.net/forum/
@tinker my main disappointment with people demonstrating has strength on NTLM hashes is the same as when a pen tester tells me they got my /etc/passwd file. That hasn’t been an important security control for decades. It’s like cracking single DES passwords from 1974 unix systems. If, in 2019, NTLM hashes are protecting something important to someone, the fact that they are easier to crack is not their big problem.
@paco - If they got access to /etc/passwd file that you were using and used it to privilege escalate or make lateral movements, then I’d imagine you’d care.
Similar with corporate environments who use NTLM for localhost password storage or Active Directory authentication and have a corporate policy that allows for a minimum of eight character passwords.
This matters precisely because it is still in widespread use.
@tinker The case against NTLM was made a decade ago. The fact that it went from double digit hours to single digit hours isn’t going to motivate someone who wasn’t motivated by all the other sound reasoning. As I said, if they are knowledgable of the risks, and yet somehow still comfortable running NTLM, this isn’t going to change their mind.
But I’m still coming across websites who flip out if you go more than 13 characters.
One example, not a website, but you can’t log in to Xbox360 if your Microsoft account password is more than 13 characters I think. It might even be less >:(
@tinker so what is the risk to a home laptop? Someone would have to physically gain access? How would my laptop pw hash be captured for hacking?
@donblanco - As long as its encrypted, you’re fine. For home networks, make sure your wifi password is long.
@tinker In order to have a hash offline, doesn't this mean that some other system has to be breached in the first place? or MITM? This seems to be something interesting in the lab, but a more rare threat in the wild.
@tinker but the amount of work to check a password can be increased a lot. It just has to not take too long to inconvenience the user when logging in.
@waterbear - Yeah.... yeah. Think they are. Even on slow hashes that push it out to a couple of days to even a couple of weeks. That's still within many attackers' budgets.
Problems are the sites that have stupid passwords length limits lower and upper limits with even limited characters set! 🤬
@tinker But this is only if you have physical access to the machine. Remote logins usually add a delay to prevent repeated password searches. A three second delay after the first failed login would reduce bruteforce attempts to 28800 guesses per day.
A Mastodon instance for info/cyber security-minded people.