DATA DOCTORS

Here’s how hackers are able to crack your passwords

Feb 27, 2021, 7:15 AM

(Photo by Tomohiro Ohsumi/Getty Images)...

(Photo by Tomohiro Ohsumi/Getty Images)

(Photo by Tomohiro Ohsumi/Getty Images)

Q: How can hackers try millions of passwords at a time when I will get locked out after 3 failed attempts?

A: Passwords continue to be the primary target of cybercriminals because they represent the “keys to your kingdom,” especially when it comes to your email account.

Online security tools such as Gibson Research’s Haystack tool show you just how quickly any short password can be cracked, but it’s based on billions and trillions of guesses per second.

Tools like this are showing how fast a ‘brute force’ attack can break shorter passwords, which typically will occur offline.

Offline Password Cracking

Your question is a common one because most people assume that password hacking is done through the same interface as we all use to log into our accounts, but that’s not the typical approach.

All of the websites that require you to enter a password store those passwords using some form of what’s known as ‘hashing’. This means that your password is converted into a random string of characters that looks nothing like your actual password before it gets stored on their servers.

As an example, the common password “monkey” in MD5 Hashing will always be stored as “d0763edaa9d9bd2a9516280e9044d885” which is child’s play for a computer to convert back to the original word.

Most offline cracking activity begins after a breach has occurred and the database of ‘hashed’ passwords are stolen and saved elsewhere to be worked on.

Think of it as a bank robber stealing the vault and cracking it somewhere else vs. trying to crack open the vault at the bank itself.

Brute force attacks are essentially a guessing game that pits computing power against the length of your password, which is why creating a longer password is always better.

It’s simple math as every combination of letters, numbers and special characters can be tried in milliseconds if there is enough computing power available.

In the Haystack tool, you will see that any 8-character password can be broken in just over 1 minute.

As you add additional characters, the time to crack them goes up because each additional character exponentially increases the number of guesses required.

Given enough time, all passwords can be cracked, so what you want to do is create long enough passwords that aren’t worth the time to crack.

Other Password Hacking Techniques

Brute Force is just one of many methods hackers use to crack passwords, which is why it’s so important to use a different long password for each of your online accounts.

There are ‘Dictionary attacks’, which use every word and any combination of those words that can be found in a dictionary.

‘Rainbow Table attacks’ use a form of known password databases because they’ve pre-computed all of the possible password combinations for all of the most common hashing techniques in one big table. This greatly reduces the time it takes to crack a password because it becomes a simple lookup exercise.

Although these attacks have been around since the beginning, sophisticated phishing and social engineering schemes are a faster way to get real passwords that can be exploited, which is why they continue to grow and evolve.

Data Doctors

Copilot+ PC technology computers electronics...

Data Doctors

Is a Copilot+ PC Worth Buying?

If you're shopping and looking at different electronics on the market, you might come across the Copilot PC+. Here are details you should know.

6 days ago

Organizing computer cables of of your 2025 resolutions?...

Data Doctors

Sick of messy computer cables cluttering your carpet? Try these easy cable organization tips

If you're wanting to get better at organizing computer cables in the new year, here are a few technological tools and tricks to check out.

13 days ago

Windows voice typing...

Ken Colburn, Data Doctors

Here’s how effective Windows voice typing is

The ‘voice typing’ feature, including on Windows, is a tool that can be very useful for those who are tasked with inputting text throughout the day.

20 days ago

Video conferencing 2025 tips: How good is a Chromebook?...

Data Doctors

Should you use Chromebooks for video conferencing?

Should you use a Chromebook for your video conferencing needs? It's a complex issue with different technological factors to consider.

27 days ago

FBI warning about text messaging: 4 tech tips to know...

Data Doctors

What’s up with the new FBI warning about text messages?

Did you just get an FBI warning about text messaging? Even if you aren't a government worker, your data could be at risk. Follow these safety steps.

1 month ago

(Pexels File Photo)...

Data Doctors

Beware of ‘quishing’ emails! These scary scams can hurt your computer

Ever heard of quishing? This scary scam is a type of phishing email. Click on it at your own peril. It can infect your computer with malware.

1 month ago

Sponsored Articles

...

The UPS Store

How The UPS Store is giving back to the community

PHOENIX -- As 2024 nears a close, The UPS Store is looking to give back to the Arizona community with the holiday season approaching.

...

Sanderson Ford

Sanderson Ford’s Operation Santa Claus: Spreading holiday cheer through pickleball

Phoenix, AZ – Sanderson Ford, a staple in the Arizona community, is once again gearing up for its annual Operation Santa Claus charity drive.

...

Morris Hall

West Hunsaker, through Morris Hall, supports Make-A-Wish Foundation in Arizona

KTAR’s Community Spotlight this month focuses on Morris Hall and its commitment to supporting the Make-A-Wish Foundation in Arizona.

Here’s how hackers are able to crack your passwords