Sponsored Content
The Lounge What is on Your Mind? The most common passwords this year, 2018. Post 303027464 by MadeInGermany on Sunday 16th of December 2018 07:14:36 AM
Old 12-16-2018
I am also sometimes refused by today's overloaded GUIs where you often cannot see if a picture is a navigation or an advertisement. (If you are suspicious and have time you can try options on it, right mouse click or "click+hold").
I have seen a wanted action, for example a "continue" button, after 2 seconds being replaced by an advertisement...
Fortunately not on Unix.com. Yet.

Back to the passwords.
In the good old times we ran "crack" on the Unix pw crypts.
The input for crack was made of a top 100 list and a dictionary and a top 100 modification rules.
Users with a cracked pw got mail, with tips for a safe pw.
A wrong pw was punished with a delay before it prompted for a new pw. That made hacking less attractive.
Today companies establish "good" passwords by enforcing longer pws, character set rules, and comparisons against a history of old pws. (Storing pws in a DB? I get sick!)
Then, companies intoduce multi-factor authentication. You must install a dozen apps on mobile devices that generate pin codes. Of course these apps are 100% safe...
And then, there is a dozen applications that have there own pws - of cause with all flavours of security turned on!
If you work for 3 companies there is hardly enough space on the backside of your keyboard to hold all the passwords and pin codes...
 

4 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

passwords

Dear all, I need to automate/script a user password change process. I'm helpless cannot use expect since it's not installed and cannot install it either. Do i have an alternative. I can store the password in a file and that would be the password that would be set to all the users. If not i don't... (1 Reply)
Discussion started by: earlysame55
1 Replies

2. UNIX for Advanced & Expert Users

When did UNIX start using encrypted passwords, and not displaying passwords when you type them in?

I've been using various versions of UNIX and Linux since 1993, and I've never run across one that showed your password as you type it in when you log in, or one that stored passwords in plain text rather than encrypted. I'm writing a script for work for a security audit, and two of the... (5 Replies)
Discussion started by: Anne Neville
5 Replies

3. What is on Your Mind?

Football / Soccer World Cup 2018 draw.

What is on Your Mind? 2018 FIFA World Cup - Wikipedia I'm hoping that England are drawn into positions B2, D3, G3 or G4 so that all their games will be outside usual UK office hours and people will not desert the office with mystery illnesses to watch the games. Expecting failure, so I... (1 Reply)
Discussion started by: rbatte1
1 Replies

4. What is on Your Mind?

Holiday Thoughts for the End of 2018

Happy Holidays. Here are my randoms thought at the end of 2018 in no particular order. You Are Truly Blessed IT people are lucky. We get to use our brains extensively to solve complex and challenging computer-technology related problems. This is very good for our brains. Programming,... (2 Replies)
Discussion started by: Neo
2 Replies
PSK-CRACK(1)						      General Commands Manual						      PSK-CRACK(1)

NAME
psk-crack - Crack IKE Aggressive Mode Pre-Shared Keys SYNOPSIS
psk-crack [options] <psk-parameters-file> <psk-parameters-file> is a file containing the parameters for the pre-shared key cracking process in the format generated by ike-scan with the --pskcrack (-P) option. This file can contain one or more entries. For multiple entries, each one must be on a separate line. The program can crack either MD5 or SHA1-based hashes. The type of hash is automatically determined from the length of the hash (16 bytes for MD5 or 20 bytes for SHA1). Each entry in the <psk-parameters-file> is handled separately, so it is possible to crack a mixture of MD5 and SHA1 hashes. psk-crack can also crack the proprietary hash format used by Nortel Contivity / VPN Router systems. When cracking Nortel format hashes, you need to specify the username of the hash that you are cracking with the --norteluser (-u) option. When cracking Nortel format hashes, you can only crack one hash at a time. By default, psk-crack will perform dictionary cracking using the default dictionary. The dictionary can be changed with the --dictionary (-d) option, or brute-force cracking can be selected with the --bruteforce (-B) option. DESCRIPTION
psk-crack attempts to crack IKE Aggressive Mode pre-shared keys that have previously been gathered using ike-scan with the --pskcrack option. psk-crack can operate in two different modes: 1) Dictionary cracking mode: this is the default mode in which psk-crack tries each candidate word from the dictionary file in turn until it finds a match, or all the words in the dictionary have been tried. 2) Brute-force cracking mode: in this mode, psk-crack tries all possible combinations of a specified character set up to a given length. OPTIONS
--help or -h Display this usage message and exit. --version or -V Display program version and exit. --verbose or -v Display verbose progress messages. --dictionary=<f> or -d <f> Set dictionary file to <f>. The default is /usr/local/share/ike-scan/psk-crack-dictionary. --norteluser=<u> or -u <u> Specify the username for Nortel Contivity cracking. This option is required when cracking pre-shared keys on Nortel Contivity / VPN Router systems. These systems use a proprietary method to calculate the hash that includes the username. This option is only needed when cracking Nortel format hashes, and should not be used for standard format hashes. --bruteforce=<n> or -B <n> Select bruteforce cracking up to <n> characters. --charset=<s> or -c <s> Set bruteforce character set to <s> Default is "0123456789abcdefghijklmnopqrstuvwxyz" AUTHOR
Roy Hills <Roy.Hills@nta-monitor.com> February 14, 2005 PSK-CRACK(1)
All times are GMT -4. The time now is 08:22 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy