Cracking Windows Passwords: Do You Feel Secure?
a2jfreak
Houston, TX Member
This kinda bites: http://news.com.com/2100-1009_3-5053063.html?tag=fd_top
0
Comments
These are the people who designed the algorithm to crack the passwords
Look, the NT community has known for a very long time that windows passwords just plain suck - hell, security in windows is a joke, period. That's why important computers run unix.
First of all, understand that you must have admin access to get the lanman hash file. Of course, we all know that this is very simple to acheive on 94% of the windows computers in the world. But the lanman hash has always been easy to crack - ntcrack has been around since 1997. You can look at this in a couple of ways:
1) This is yet another example of why good password policy is important. Not that it matters, 95% of the people in corporate america still use their kid's first name as their password, or something equally idiotic, like "god" or "ceo" or "fumblenutz1", not realizing that by adding a ~ or an ! to the end of their password would go leagues towards making it more secure. In this regard, absolutely nothing has changed as far as this "story" is concerned - so these dudes made it take 30 seconds instead of two hours to crack - sweet.
2) This "news" is the mass-media variety - I'm sure we'll be seeing it on local evening news broadcasts, they love this "techie" crap - but it's not like CIOs and IT department heads don't already know about NT's bullcrap security. So this is just another case of "wow, this will make great 10:55pm end of the night news! Let's scare the crap out of all the home broadband users!"
Moral of the story: Security in windows has always sucked - this is NOT new. Use @#*&@#*& in your passwords, please.
Not that that matters either - a 256bit encrypted version of "bob" or "1234" is still a bullcrap password. People need to realize that using passwords like "UIT23jjfje__12!!!*~k" are the only way to make passwords more secure. Believe me, no matter how encrypted it is, if it's a simple word or number or word/number combo, modern crack programs can slice through them easily - you'll see in an article that I'm working on for short-media
Perhaps it does get a bit blown out of proportion, but it still poses a risk that could be greatly reduced by simply adding a few bits of random data while encrypting the passwords.
Yes! Yes! Yes! Now I know your password! Now I can control the, erm, well, I guess I can't trully control squat with that password. Oh well.