• This is a political forum that is non-biased/non-partisan and treats every person's position on topics equally. This debate forum is not aligned to any political party. In today's politics, many ideas are split between and even within all the political parties. Often we find ourselves agreeing on one platform but some topics break our mold. We are here to discuss them in a civil political debate. If this is your first visit to our political forums, be sure to check out the RULES. Registering for debate politics is necessary before posting. Register today to participate - it's free!

Online security practices

I see why you didn't try to explain it to me. It's somewhat complicated these days to crack a good password.

Thanks for the enlightenment.

Actually, it's the opposite. It's extremely easy. Software like haschat will crack passwords for you automatically with minimal effort on your part. It just takes a lot of processing power to do that. That's why we use strong passwords with lower case, upper case, special characters, etc.

If you point haschat at a password file it will start brute forcing all the passwords and you will see all the easy ones start popping up almost instantly. Ones like the "treebluenight" will start popping up in a few minutes while ones like Tr33bluen1ght might take days or weeks to start appearing. The goal is that it would take so long to ever get to yours that the hacker would be satisfied with all the ones he already cracked and would quit cracking passwords before he gets to yours. Ideally, your password is long enough and random enough that it would take decacdes and be prohibitively expensive to crack. These days you can achieve that with about 16 characters if you include upper case, lower case, digits, and special characters.
 
Actually, it's the opposite. It's extremely easy. Software like haschat will crack passwords for you automatically with minimal effort on your part. It just takes a lot of processing power to do that. That's why we use strong passwords with lower case, upper case, special characters, etc.

If you point haschat at a password file it will start brute forcing all the passwords and you will see all the easy ones start popping up almost instantly. Ones like the "treebluenight" will start popping up in a few minutes while ones like Tr33bluen1ght might take days or weeks to start appearing. The goal is that it would take so long to ever get to yours that the hacker would be satisfied with all the ones he already cracked and would quit cracking passwords before he gets to yours. Ideally, your password is long enough and random enough that it would take decacdes and be prohibitively expensive to crack. These days you can achieve that with about 16 characters if you include upper case, lower case, digits, and special characters.

I did see where parallel processing (like deep blue) was the way to go for hacking passwords.

You mentioned a key logger program earlier. I've often wondered how someone would be able to find a password among thousands of key strokes.
 
I did see where parallel processing (like deep blue) was the way to go for hacking passwords.

You mentioned a key logger program earlier. I've often wondered how someone would be able to find a password among thousands of key strokes.
I don't need to find it. I can use the results of the key logger as the dictionary for hashcat and it will try every word you typed and tell me which one was the password.
 
Last edited:
I don't need to find it. I can use the results of the key logger as the dictionary for hashcat and it will try every word you typed and tell me which one was the password.

I see. Work smart, not hard.

I'll be trying hashcat in the near future. Just to see how it works of course. Call it educational.
 
The proxies could be spying on you, performing man in the middle attacks, etc. and provide no security benefit.

Yes, this is an ongoing concern with vpns. Basically it all comes down to trust.
 
Back
Top Bottom