Copy Link
Add to Bookmark
Report

H-Net Magazine Vol 1 Issue 1 File 09

eZine's profile picture
Published in 
H Net Magazine
 · 26 Apr 2019

  

H-NET H-NET H-NET H-NET H-NET H-NET H-NET H
N N
E ** H-Net Magazine ** E
T T
H Volume One, Issue 1, File #09 of 20 H
N N
E How to Crack Those PASSWORDS! E
T T
H-NET H-NET H-NET H-NET H-NET H-NET H-NET H

THE SO-CALLED "UNCRACKABLE" PASSWORD
--------------------------------------

Many people consider the type of password - the so- called random combination
of alpha and numeric characters - to be "uncrackable" because so many billions
of combinations seem possible. A six-character password of this type using
only letters and numerals, could have 2,238,976,116 variations. This type of
password is most frequently used by large data-base vendors. It is assigned
to the user by the vendor, and is often used with systems requiring only one
access level (that is, no second security number) because the password is
believed to be so invulnerable to cracking.

In reality, however, this password format is vulnerable to solution by both
doors and algorithms. In the first case, not all passwords require the presence
of numbers. Passwords may be alphabetic characters only. In some cases pass-
words such as "GUEST" or "IBMCE" may provide a backdoor into the system.

Solution by algorithmcan also be simple because most systems do not use a truly
random method for generating passwords. We know, for example, that MILNET
passwords exclude certain letters and numbers. There are doubtlessly other
rules involved in their construction that we could discover. A study of pass-
words from a given system - we'll use Dow Jones as an example here - can
reveal the patterns that are used to create such "uncrackable" passwords.

Dow Jones passwords are generally 10 characters long. If character assignment
were truly random, we would expect that most of the characters would be alpha-
betic because there are 26 alpha characters compared to only 10 numeric char-
acters. A random system would generate 2.6 alphas for each numeric character.
In fact, however, Dow Jones passwords appear to have only 4 or 5 alphabetic and
have 5 or 6 numeric characters. This is our first clue that the password sel-
ection proccess is not random. Here is a sample of the typical Dow Jones
passwords:

92J62P4BUF
35K4UPK931
59LTAN7521

Patterns are readily discernable:

1) The first two characters are numbers
2) The third character is a letter of the alphabet
3) Each password has at least two numbers that are duplicates.
4) No password has three numbers that are the same
5) Each password has one three-letter combination that includes a vowel
(eg. BUF,UPK,TAN)
6) This alpha-triplet can begin at any character from the fourth to the eighth
position.
7) No password has more than one vowel.
8) Passwords may have either 4 or 5 alphabetic characters.
9) While a password may have two alpha characters that are the same,these
letters do not follow one another,
10) Of the 16 numbers used in the passwords above, none is a zero.

Examination of a large number of passwords would doubtlessly reveal other
"rules" that were used in Dow Jones password selection. Each newly-discovered
"rule" would limit the actual number of available passwords and make the system
that much more subject to cracking by computer.

TAKING THE "RANDOM" OUT OF RANDOM

One of the most notable factors in so-called tables of computerized "random"
numbers is that there are two basic ways of creating them. The first method is
to create a table that will provide what can statistically be said to be a
random list - that is no number or letter would theoretically occur more
frequently than any other number or letter. Most systems, however, simply rely
on an electronic component that creates alledgedly "random" numbers. These
hardware random number generators are usually biased in their number selections

One simple test of a random number generator is called the "coin toss test." A
program is written to simulate the results of a thousand or so coin tosses.
Were the random number generator truly random, heads would appear about as
frequently as tails. In an actual test, however, heads appeared 421 times, and
tails appeared 579 times - a significant bias. A test such as this could be
performed over the entire alphanumeric character list and the component's bias
chartered. Once this information was known, the cracking computer could be
programmed to insert this selection bias into it's own attempts to generate
passwords. This is yet another step that evens the odds between the hacker and
the so-called "uncrackable" password. This testing scheme, requiring either a
component or a computer like the target computer, would be a lengthy process,
but some people might regard the product as worth the time involved in
preparing such an analysis. A strategy of cracking Dow Jones system, given the
rules listed above, would be to create a program with an algorithm that
provided combinations of passwords meeting the criteria above. As each
creation was tested, a pattern might be found in the successful creations that
would make the algorithm even more selective. One would expect, for example,
that simular to the MILNET and ARPANET passwords, certain confusing characters
would be eliminated from passwords. The number, "0" is often eliminated, for
example, because it is easily confused with the letter "O".

===============================================================================
[Hackernet BBS,LEEDS,UK(0532)557739, 24hrs. Home of H-Net Hacking magazine]


← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

DrWatson's profile picture
@DrWatson
18 May 2024
Hi Jeroen :) I am happy to read your message. I remember playing with your starfield back in the days. I had a look at figuro.io and i ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
18 May 2024
Thank you for the comment 😊 This theory was formulated starting from the 17th century, when no appropriate scientific studies had yet been ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
18 May 2024
Many cultures are slowly disappearing also today and with them ancient knowledge thousands of years old. Ancient knowledge must be preserved ...

guest's profile picture
@guest
17 May 2024
The theory of the hollow earth is very complex with many direct testimonies and official documents. For example, a study by scientists done ...

guest's profile picture
@guest
17 May 2024
The crew made an elementary mistake by ignoring the stall warning. They caused a disaster with a number of basic mistakes.

guest's profile picture
@guest
17 May 2024
I'm Jeroen Commandeur, aka Vulture/Outlaw Triad. I wrote this tutorial almost 30 years ago. It's nice to see it listed here. :-) ...

DrWatson's profile picture
@DrWatson
17 May 2024
Very funny that I needed to translate the previous comments to understand them 😊 My article is very popular abroad 🥰 It seems like everyone ...

guest's profile picture
@guest
17 May 2024
그렇게 징그럽진 않네… 근데 나비 불쌍해ㅠㅠ

guest's profile picture
@guest
17 May 2024
너무 불쌍해 ㅠㅠ

guest's profile picture
@guest
17 May 2024
외계인이 사람을 잡아다 상체와 하체를 자르고 요상한 관으로 이어놓고 살려둔 뒤 한 걸음 걷는 순간 그 관이 떨어져 죽게 만든다고 생각을 하니 호달달달 쥰나게 무서워졌다 ...
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT