this post was submitted on 29 Feb 2024
115 points (95.3% liked)

Technology

59589 readers
3332 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Haha, brand new company with MD5 password hashes. Maybe they oughta consult about securities with their/other AIs more often. Hopefully, nobody did anything naughty on the site.

Other links on the story:

you are viewing a single comment's thread
view the rest of the comments
[–] ArtVandelay@lemmy.world 25 points 8 months ago (1 children)

It's a good thing not just everybody can afford a raspberry pi zero that would be necessary to crack an MD5 in seconds

[–] viking@infosec.pub -1 points 8 months ago* (last edited 8 months ago) (3 children)

That really depends on the password complexity. Sure, you can crack a password of 6-8 characters in below 30 minutes, but anything more complex than that will take days and longer.

My default password is 22 characters long and includes a unique identifier for each service plus a checksum. Say as an example (similar enough to my actual use case) for Adobe I'll have "Ae" (first and last letter of the service) and "41" in a specific position (A = 41 in Hex).

That way even if I repeat the other 18 characters (including symbols, upper and lower case characters) it will take years or even decades on a consumer grade system to crack my password, and the hash is unique for each service/website, so there won't be any collateral damage either, even if some service I used got breached and my password somehow fully exposed.

[–] ReginaPhalange@lemmy.world 26 points 8 months ago (2 children)

Why do people humble brag about their password strength, but then tell the whole world how to construct rainbow tables designed to crack their passwords?

[–] InnerScientist@lemmy.world 6 points 8 months ago

Iirc rainbow tables are currently useless due to ~~good seasoning~~ salt.

Though password crackers can take a known pattern to drastically increase speed it would still have to do the whole calculation for every password.

[–] viking@infosec.pub 1 points 8 months ago (1 children)

Like I mentioned, I'm using a related pattern, nothing as simple as the one I sketched out here.

[–] LostXOR@kbin.social 1 points 8 months ago (1 children)

As long as the other 18 characters are randomly generated that seems secure enough, and a decent way to keep track of which passwords are associated with which accounts.

[–] LordKitsuna@lemmy.world 9 points 8 months ago

Feels like just a roundabout an exceptionally more difficult way to achieve a strong password versus just a password manager. Where you can do ridiculous things like have a 100 character long password

~~Only to discover that the website will accept 100 characters in the box but actually truncate it to like 40 without telling you~~

[–] noodlejetski@lemm.ee 20 points 8 months ago

I think I'll stick with a password manager and its randomly generated passwords instead of doing an algebra problem every time I want to check my email

[–] RiQuY@lemm.ee 5 points 8 months ago

I guess then "hunter2" users are in trouble.