[Tfug] Why would *anyone* leave a door open?

Bexley Hall bexley401 at yahoo.com
Fri Aug 28 17:59:07 MST 2009


> Your "John the Ripper" example

I don't use "John the Ripper".

> doesn't work for WPA2 cracking, the SSID is integrated
> into the hash.  So, you need a premade list that has been
> computed with the SSID into all the words in the dictionary
> list.   That you are trying to crack, that is what makes
> WPA2 that much more secure.

Ah, so an SSID like, maybe "linksys"?  Gee, I wonder how many
*thousands* of networks in Tucson alone have *that* SSID??

Every "secure" system has been *considered* secure -- until
it was PROVEN otherwise.  If you think any one of these is *truly*
secure, you just haven't seen the right "headline"... *yet*!

I stand by my claim:  When someone breaks into my house to tap
into my WIRED network (and decides *not* to simply walk off with
all of my machines) *then* I'll worry about my security...  ;-)
 
> Example of a premade list:http://www.churchofwifi.org/default.asp?PageLink=Project_Display.asp?PID=90
> 
> The
> 1000 SSID list here took 3 days of some serious computing
> power to make a list that works with cracking WPA2 networks,
> if the SSID of the network does not exist in this list you
> would have to do some serious number crunching yourself to
> make a dictionary list for that one SSID you are trying to
> crack.  It would take days to add an SSID you were trying
> to crack to the list in the above example with a normal dual
> core system.  Lots of withs.. ;p
> 
> 
> 
> On Fri, Aug 28, 2009 at 3:29 PM,
> Bexley Hall <bexley401 at yahoo.com>
> wrote:
> 
> 
> > >>> s/does/did/
> 
> > >>
> 
> > >> OK...what the hell does that mean?
> 
> > >
> 
> > > Substitute 'does' with 'did'. Not
> a vi user, eh? ;-)
> 
> >
> 
> > Ah.  Meaning he probably threw
> it in there now :).
> 
> >
> 
> > Good news is, I deliberately used a passphrase that
> I've
> 
> > never actually used :).
> 
> >
> 
> > I tend to use that sort of style though, and recommend
> it
> 
> > often.  It's the best way to memorize a long
> passphrase.
> 
> >
> 
> > You can also create "families" of passwords
> with it. 
> 
> > In other words, both a longer and shorter version of
> the same
> 
> > concept.  Done right,
> 
> > each has meaning only to you, so that if one is
> compromised
> 
> > the other version isn't, or at least the search is
> only narrowed a
> 
> > little bit but still basically impossible.
> 
> >
> 
> > Example...if the long phrase is
> 
> > "iseedeadpeopleinabadmovie", the short
> 
> > might be "ghostpoop".  To a human, one will
> remind you of the other,
> 
> > but to a computer there's no link.
> 
> 
> 
> But some cracking algorithms don't *care* about
> the significance
> 
> of the character sequence you choose!  E.g.,
> "34fdY7g42" is just as
> 
> (insecure) as "ghostpoop"!  Dictionary based
> attacks rely on
> 
> the dictionary happening to contain the vulnerable
> password
> 
> in order to work.  So, using digits "4",
> "8", "2", etc. make
> 
> your password more likely to appear in such a list
> (dictionary).
> 
> E.g., born2run, iamgr8, ready4it, etc.
> 
> 
> 
> OTOH, other cracking techniques essentially try *all* of
> the
> 
> possible combinations of characters (in a less
> computationally
> 
> intensive approach).  So, passwords that wouldn't
> *tend* to
> 
> appear in a "dictionary" are just as likely to be
> discovered
> 
> as those that *would*.  As such, your best defense is a
> 
> longer (wider) password and/or using characters that
> *really* are
> 
> "never encountered" in passwords.
> 
> 
> 
> As I said, theory and practice are very different animals
> 
> in this world.  And, just because something *seems*
> secure,
> 
> doesn't mean someone hasn't found a way to
> *efficiently*
> 
> circumvent it!
> 
> 
> 
> Is someone going to crack your password if they have to
> gain
> 
> *physical* access to your machine (i.e., you keep it
> offline
> 
> as I do mine) *and* have to be motivated to *want*
> what's
> 
> on your machine?  Or, are they going to attack some
> account
> 
> of yours (banking account$ tend to be worth $omething to
> 
> $tranger$!) that is publicly accessible with little
> 
> *practical* hope of ever being "traced" to the
> attacker?
> 
> 
> 
> If I have to break into your home to tap into your wired
> 
> network, I put myself at considerable risk.  OTOH, if I
> 
> can sit down the end of the block -- or, in a
> neighbor's
> 
> house -- and do this "safely"...
> 
> 
> 
> Do the math.
> 
> 
> 
> 
> 
> 
> 
> 
> 
> _______________________________________________
> 
> Tucson Free Unix Group - tfug at tfug.org
> 
> Subscription Options:
> 
> http://www.tfug.org/mailman/listinfo/tfug_tfug.org
> 
> 
> 
> 
> -----Inline Attachment Follows-----
> 
> _______________________________________________
> Tucson Free Unix Group - tfug at tfug.org
> Subscription Options:
> http://www.tfug.org/mailman/listinfo/tfug_tfug.org
> 


      




More information about the tfug mailing list