Cracking the Code: An Introduction to Password Cracking and Security

Dr. Jaber Kakar
4 min readAug 28, 2023

--

In the digital age, passwords stand as the first line of defense protecting our personal information, sensitive data, and online identities. However, the prevalence of weak passwords and the constant evolution of hacking techniques make password security a critical concern. In this article, we’ll delve into the world of password cracking, understanding its methodologies, implications, and strategies to support your digital security.

Password cracking

The Significance of Password Security

Passwords serve as the keys to our digital applications, granting access to email accounts, social media profiles, online banking, and more. A secure password acts as a first barrier against unauthorized access, safeguarding our private information from malicious actors.

Common Password Vulnerabilities

  1. Weak Passwords: Simple passwords like “123456” or “password” remain shockingly common, making it easy for attackers to gain unauthorized access.
  2. Password Reuse: Using the same password across multiple accounts increases the risk of a single breach compromising multiple services. In fact, tools (e.g., Breach-Parse) and websites (e.g., DeHashed.com) exist that list compromised passwords/assets that can be used for password cracking.
  3. Dictionary Words: Passwords that contain words or phrases that are simple to guess are vulnerable to dictionary attacks (see password cracking methodologies for further details).
  4. Lack of Complexity: Complex passwords combine uppercase and lowercase letters, numbers, and special characters. Weak passwords lack this complexity.

Password Cracking Methodologies

Screenshot of GRC’s interactive brute force search space calculator tested on the password “1234”
Screenshot of GRC’s interactive brute force search space calculator tested on the password “1234”
  • Dictionary Attacks: To guess passwords, attackers use a list of often-used words, phrases, and variations. This method works well with dictionary-based, easy-to-remember passwords.
  • Rainbow Table Attacks: Before discussing this attack, let’s quickly go through password hashes. Passwords are not kept on the server in plain text form; instead, they are encrypted into meaningless strings of characters. This procedure, known as hashing, is a protection mechanism against password misuse. Keep in mind that your password is transformed into a password hash (value) and compared to the one that was previously stored each time you input it to log in. If the hash values match, you are logged into the system. Attackers now employ password hash precomputed tables in rainbow table attacks to swiftly compare against stolen hashes. This attack method is effective against unsalted passwords, where salting refers to adding random data to the passwords before hashing it.

Defending Against Password Attacks

  1. Strong Passwords: Create passwords that are at least 12 characters long and include a mix of letters (both cases), numbers, and special characters. Check out the section below on how to generate strong passwords if you’re interested.
  2. Password Managers: Use password managers to generate and store complex passwords securely. This eliminates the need to remember numerous passwords.
  3. Multi-Factor Authentication (MFA): By requiring additional steps of verification, like a text message or app-generated code, MFA offers additional degrees of protection. A special case of MFA is Two-Factor Authentication (2FA), where the user provides exactly two different types of information to prove his identity.
  4. Password Policies: Organizations should enforce strong password policies, requiring employees and users to adhere to password complexity rules.

Creating a Strong Password

Crafting a strong password doesn’t need to be a daunting task. Here’s a simple formula:

  1. Mix of Characters: Combine uppercase and lowercase letters, numbers, and special characters.
  2. Randomness: Avoid using easily guessable information like birthdays or names.
  3. Length: Typically, the longer the password the harder it is to crack. Consider passwords of at least 12 characters in length.
  4. Unpredictability: Create a password that doesn’t follow common patterns. For instance, avoid common substitutions, e.g., “@” instead of “a” (Example: “p@ssword” instead of “password”).
  5. Tools: You may want to consider using a password manager. As already discussed they simplify the process of generation and storage of complex passwords.

Example of a strong password:

"bZ3@kJh3W!re$!"

By following these principles, you can generate passwords that are resilient against brute force and dictionary attacks.

Ethical Aspects of Password Cracking

Password cracking, when done ethically, helps organizations identify weak passwords and potential security risks. Ethical hackers engage in password cracking with explicit permission, aiming to enhance security rather than exploit vulnerabilities.

Real-World Implementations / Resources

  • Common Passwords: Lists of most common passwords are regularly published, showing just how widespread weak passwords are. In 2021, “123456” and “password” remained among the top passwords. Here is a Wikipedia list of the 10,000 most common passwords.
  • Password Complexity Tools: Tools like “John the Ripper”, “Hydra”, and “Hashcat” are often used to compute the time it would take to crack passwords using brute force or dictionary attacks.
  • Password Managers: Popular password managers like LastPass, 1Password and KeePassXC help users generate strong, unique passwords for each account, alleviating the burden of memorization.

Conclusion: Strengthening Your Digital Fortress

Password security is a shared responsibility between individuals and organizations. By understanding the vulnerabilities associated with weak passwords, the methodologies employed by attackers, and the strategies to defend against attacks, we empower ourselves to create a safer online environment. Whether through strong passwords, multi-factor authentication, or adopting secure practices, each step we take contributes to the defense of our digital identities and the protection of our valuable information. Remember, after all a strong defense begins with a strong password.

Thanks for reading! If you want to learn more about Ethical Hacking, please subscribe to this blog. We will constantly be posting articles to help you start your cyber security journey as an ethical hacker!

--

--

Dr. Jaber Kakar

🔐 Cybersecurity Enthusiast | Ethical Hacker in the Making | Exploring the Digital Battlefield | Sharing Insights to Safeguard the Online Realm 🔐