Ophcrack Says Your Password Is Insecure 249
javipas writes "An insightful article at Jeff Atwood's Coding Horror reveals the power inside Ophcrack, an Open Source program that is capable of discovering virtually any password in Windows operating systems. The article explains how passwords get stored on Windows using hash functions, and how Ophcrack can generate immense tables of words and letter combinations that are compared to the password we want to obtain. The program is available in Windows, Mac OS and Linux, but be careful: the generated tables that Ophcrack uses are really big, and you should allow up to 15 Gbytes to store these tables."
There's no way they're getting my password! (Score:5, Funny)
Re: (Score:2)
norad:~# echo "" | md5sum
68b329da9893e34099c7d8ad5cb9c940 -
norad:~#
Re: (Score:3, Informative)
d41d8cd98f00b204e9800998ecf8427e
His password is nothing, not a newline.
Re:There's no way they're getting my password! (Score:5, Funny)
Re: (Score:2)
Re:There's no way they're getting my password! (Score:4, Funny)
Re:There's no way they're getting my password! (Score:5, Informative)
norad:~# echo "" | md5sum
68b329da9893e34099c7d8ad5cb9c940 -
Actually, it's:
Password:
LM Hash: AAD3B435B51404EEAAD3B435B51404EE
NT Hash: 31D6CFE0D16AE931B73C59D7E0C089C0
Windows password hashes are not MD5...
Brought to you by the "genhash" utility of the PassTheHash toolkit for Windows. (Google it, it's awesome.)
Re:There's no way they're getting my password! (Score:5, Interesting)
Re: (Score:2)
My network isnt connected to the intertubes, so why cant i have a blank password for a remote desktop connection.
Re:There's no way they're getting my password! (Score:5, Insightful)
IMO There is absolutely no point in having a lock on a bathroom door, as it is TRIVIAL to bypass with something as simple as a small screwdriver.
Oh wait, yet, despite that, it is remarkably effective at keeping people out while your in there.
Many locks and passwords are more symbolic than anything else. Most people respect the implied privacy requested by a lock or password. Even if they know they could circumvent it trivially, they don't do it.
Re:There's no way they're getting my password! (Score:4, Funny)
This is news? (Score:3, Insightful)
Re: (Score:2, Interesting)
Re:This is news? (Score:4, Interesting)
Re: (Score:2)
Security at it's finest.
Re: (Score:2)
Re: (Score:2, Informative)
Yes, it's called "Bitlocker".
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
For further protection, there is a third party utility called BestCrypt which loads a low level device driver that intercepts the read and write calls between Windows and the swap file, and encrypts it with a randomly generated key every time the machine gets booted.
IMHO, the best protection for nearly any Windows machine is whole disk encryption (BitLocke
Re: (Score:3, Informative)
BitLocker is only available in Windows Vista Ultimate.
Unrelated to BitLocker, Vista supports encrypting the swap file with a random key generated on startup (same as the way it's done in Linux). The setting is buried inside the EFS settings in Group Policy.
I don't know if the swap file encryption setting is available in all editions of Vista or not--group policy wasn't available in XP Home Edit
Re: (Score:3, Informative)
And unless you keep all your important data on an encrypted partition, and use encrypted swap (can you do this in windows??), then you really don't have much protection, and shouldn't assume that the data on your computer is locked down.
That's the idea behind BitLocker. When it was discussed on here, a lot of people compared it to FileVault, PGP/GPG, and NTFS EFS (Encrypting File System). The point is, none of those can do the kind of total protection that encrypting EVERYTHING on the system volume (and any others you want protected, except you need an unencrypted boot partition) provides.
Or, to answer your question a little differently: Yes, Windows Vista can encrypt all your data and the swap (pagefile.sys in Windows). My $DEITY, what a
Re: (Score:2)
Re: (Score:2)
So... (Score:5, Funny)
Back in the day, getting Windows passwords was as easy as opening a program from a floppy. That's how I got an A in Spanish class when the teacher challenged us to guess what his screensaver password was (the prize was an A for the year - dumb teacher).
Re:So... (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
That is certainly not what rainbow tables do. md5 is 128 bit. So to store every md5 hash would require 2^128 (3.4 × 10^38) * average_password_length bytes.
Re: (Score:2)
Re: (Score:2)
If you're interested in generating random, but secure passwords, I recommend my mkpasswd [ajs.com] program, which can securely generate random passwords, or generate very insecure passwords, and the entire spectrum in-between. It uses a regular-expression-like syntax for describing a possible password, and then generates random passwords that fit the pattern. For example, you can tell it that you want 10 completely rando
Re:So... (Score:5, Funny)
Total non-story (Score:2)
However it also isn't that useful since as of Windows Vista, Windo
Re: (Score:2)
If you want all my passwords (at work), just look at the cardboard backing attached to the paper calendar under my keyboard. If the IT department wanted me to have a very secure, impossible to guess password, then they would not require me to have different passwords on different company sites (payroll, timecard, network, email, etc), force me to change my passwor
Windows is insecure by design (Score:4, Insightful)
if i have physical access to the machine and have a bootable CD i have no need to crack any passwords
i can just reset the password and carry on, i have a customer whos 9yo girl showed me how she "cracks" her brothers password by booting in safe mode and simply removing his password
luckliy in some ways iam glad windows is insecure, i can only imagine the hell a user (and MS) would go through when you tell them that their entire photo/music collection is toast because they forgot their 21 random character hard to remember password
dont blame the user blame the whole crappy password concept
Re:Windows is insecure by design (Score:5, Informative)
i can just reset the password and carry on,
Physical access to a box pretty much means you have root access to that box. This is why physical security is such an important part of overall system security.
Re: (Score:2)
People think having a password on their box's login screen means their information is somehow 'safe'. Heavy encryption is the only way to keep your stuff safe.
Re:Windows is insecure by design (Score:4, Funny)
Re: (Score:3, Insightful)
Not to mention the fact that most people use only one or two password for pretty much every application, from their computers to online services.
This brings up a point... (Score:2)
6 bits per character = (ln 64) / (ln 2)
This is because there are 64 possible ascii values per string char
Re: (Score:2)
Wrong! Windows 2000+ based OS's and Active Directory allow for 64 character passwords using the entire Unicode character set. These tables attack the LMHash which is the legacy hash algorithm which stored the password hash into two 7 character hashes. Using a 15+ character password disables the LMHash from being stored. There is also a policy to
Re:Windows is SECURE by design. (Score:4, Funny)
Also, If it's windows 98, I can blue screen the thing with a con/con from the command line and hopefully you have the thing set to reboot on BSOD.
Re: (Score:3, Interesting)
Point a high-gain antenna at your window and wait for you to transmit all your precious passwords from your wireless keyboard to your ultra-secured box. Likely, your keyboard will transmit your every keystroke in "plaintext", however some wireless keyboards use encryption. It's a very weak key and can be bruted offline with minimal effort.
Sleep tight
Re: (Score:2)
Couple things (Score:5, Funny)
Tell that to
Second, if you've computed all possible hash values for all possible character combinations, then it really doesn't matter what your password is, since you only have to have the input hash to the correct hash value. Since an infinite number of character strings map to a finite number of hash values, it is only a matter of building the tables before you can hack any system.
Third, if your only defense against this type of attack is a single password, you're screwed.
Fourth, if you are worried about this sort of attack and you still live with your parents, it's probably not really too critical that you implement heavy-duty, multiple-hardened points on your Gentoo system right now. You'll have plenty of time to implement that sort of security after you finish your current bag of Cheetos.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Right, but which distribution still saves passwords in /etc/passwd? Name one, I don't know of any.
Re: (Score:2, Insightful)
Re: (Score:2)
Evidence of this would be greatly appreciated. I can't remember _ever_ seeing plaintext passwords in
Re: (Score:3, Informative)
However, the manual for 7th edition Unix (1979) specifically states that
Refs:
http://www.cs.bell-labs.com/who/dmr/ [bell-labs.com]
http://plan9.bell-labs.com/7thEdMan/v7vol1.p [bell-labs.com]
Re: (Score:2)
Early Linux distros (SLS) always used crypt(3) for their passwords, originally stored the passwords in
Re: (Score:2)
Passwords should never be saved as plaintext"
/etc/passwd, bitch!
/etc/password file.
Tell that to
Hmm. There are no passwords (hashes or otherwise) in my
You fail at funny. The fact that /etc/passwd hasn't contained password data for YEARS is funny because every newbie linux user who downloaded "how to hack.txt" and read that using linux will turn them into a cr4ck1ng GOD finds /etc/passwd and freaks out so hard that they almost knock that two liter of generic Dr. Pepper all over moms carpet every time they find it.
Wow that is a long sentance, am i writing EULAs or is the the 18th century?
Re: (Score:2)
Am I falling for something here by pointing out that there aren't any passwords in /etc/passwd - even the ones in /etc/shadow are crypted, and the file is 400.
Test ophcrack live. (Score:4, Informative)
Re:Test ophcrack live. (Score:4, Insightful)
>And it is horrifying how few windows sysadmins who know about this...
Well, they should be asking "Why are my PCs set up to let the end user boot a CD?" Or "Why do malicious users have physical access to our machines." With physical access youre pretty much sunk. Someone could moutn ntfs, write to the registry where its stores your admin password, and set it to null. I dont care what OS you use, physical access usually means trouble. Heck, if my portable tools cant crack it, I'll just take the hard drive home and work on it at my leisure.
Re:Test ophcrack live. (Score:5, Insightful)
Re: (Score:2)
Re:Test ophcrack live. (Score:4, Funny)
Re:Test ophcrack live. (Score:4, Funny)
Can you please post a list of the remaining 1% and their hashes?
Re: (Score:3, Funny)
Re: (Score:2)
Teacher: "5 minutes 'til the test ends."
You: "What? I'm still logging in!"
Re: (Score:2)
(Seriously, I do wonder what the general characteristics are of passwords it can't handle: longer? fewer alpha?)
special chars (Score:2, Insightful)
First three entries in the table (Score:5, Funny)
(blank)
password
password1 That formula will crack 90% of Windows passwords out there. The remaining 10% are what the other 14.999999 GB in the table are for.
Re:First three entries in the table (Score:5, Funny)
Re: (Score:2)
Me too! My password is *blank* since I use a key and lock on my luggage.
Re: (Score:2)
Things to note (Score:2, Interesting)
Some additional info on this topic can be seen here: http://druid.caughq.org/papers/Mnemonic-Password-Formul [caughq.org]
Re: (Score:2)
How is that possible? I thought LM did 7 characters with A-Z0-9. Even that gimped password has 36^7 or 78 billion combinations. That would require 1.2 terabytes to store (hash length is 16 bytes).
Re: (Score:2)
Windows security.... (Score:5, Funny)
Careful? (Score:2, Insightful)
Since when 15 gigs were considered "really big"?
Aren't people at conferences handing out USB sticks as schwag with 493424 gigs these days in exchange for your business card?
Re: (Score:2)
I guess since some fool said something about 640k being enough.
This is why two factor authentication is necessary (Score:3, Informative)
Re:This is why two factor authentication is necess (Score:5, Interesting)
-Rick
Re:This is why two factor authentication is necess (Score:5, Funny)
Or just force authentication against the MIT Kerberos domain.....
Re: (Score:2)
At least not for a couple years until 5TB hard disks are available.
Re: (Score:3, Insightful)
It's always been a race. Don't think one side can win forever.
Re: (Score:3, Informative)
> ttyp5 zhengyi@oracle.local.lan:~
> 0 14:11:43 504 $ echo "This is the passworrd for my new computerr" | md5
fb7393356dd5f5e6d3909e06bf64c91e
> ttyp5 zhengyi@oracle.local.lan:~
> 0 14:11:59 505 $ echo "hello12" | md5
39e8713c209ccefc6ddfafa6aedde5d1
(FreeBSD 6.2 box here; md5 came w/ the system...)
Re: (Score:3, Informative)
Windows passwords Secure? (Score:5, Informative)
In other words... (Score:2)
Re: (Score:2)
Jeff Atwood is a hack (Score:2)
There's no need to crack the password (Score:4, Interesting)
Already in Debian (Score:2)
Big deal (Score:2)
This just means you shouldn't use the same passwords for windows as you do for other stuff.
If someone can successfully run 0phcrack on your system (or its lanman hashes) it means they're already in, and they probably already have access to the data they want (can install rootkits, keyloggers etc).
It's laughable to think someone is going to physically bring it to your machine and _bother_ using it without your coopera
L0phtcrack? (Score:2)
Re: (Score:3, Insightful)
Is this another way of saying "I'm about to spew forth a load of FUD".
I guess if it's anti-microsoft FUD, it'll get modded up, right.
Re: (Score:3, Insightful)
That may have easily been true for NT 4.0, but (IIRC) Win2k and later stretches 'em out a lot more than 8 chars, esp. with AD password policies turned on. (No, not defending 'doze per se, but it simply doesn't parse IMHO).
But then, NT 4.0 once let you have perfect access to its SAM registry keys by simply letting at.exe open regedt32 for you.
(PS: If it helps, I do agree w/ you perfectly that that's a pretty crappy password.)
Re: (Score:3, Informative)
You do not remember correctly. LM hashes are created by hashing the first seven characters and the second seven characters, and truncating the hashes together. Yes, instead of having to brute force one fourteen character password, you have to brute two seven character passwords, a much easier proposition.
The hashes are created by using DES56 on the password chunks with a known key. In pract
Re: (Score:3, Funny)
It's not as simplistic as all that. (Score:3, Insightful)
From the linked blog: "How fast? It can crack the password "Fgpyyih804423" in 160 seconds. Most people would consider that password fairly secure."
Sorry Jeff, but thats a shit password. If I remember correctly NT drop anything after the first 8 characters so the password is actually "Fgpyyih8" You have one uppercase letter in there and one number. That's terrible. Where are your characters like !@#$%^&*()-_+ or extended ascii stuff? Why are you starting with a capitalized letter?
Leaving aside your incorrect remembrance of the NT LM hash algorithm, what makes you think that having funny characters, more than one uppercase, and more than one number increases your security?
Is 53cr3TPa55W@rD a better password than Fgpyyih804423? Why?
It's not a trick question. Can you demonstrate that real security is improved by having a secret string conform to a non-secret policy? Are you sure you haven't got any unexamined assumptions in your reasoning?
You also should think twice about allowing
Re: (Score:2)
Re: (Score:2)
I once locked out password, after password, after password trying to put it in. It was a UK keyboard too, and I couldn't work out why. Eventually I twigged - someone hadn't changed the default keymap from US at install time.
Re: (Score:3, Informative)
1) the last symbol is removed, so the chunk becomes a 7-character password
2) the password is uppercased (yeah, that's dumb)
and then hashes are calculated for these chunks.
BOTH the LM and NTLM (a much more secure hash) hashes are stored in the registry.
So to get a typical 8-character password, you only need to guess the first 7 characters in uppercase.
After that the more secure NTLM hash is used to guess the case of each character and the eig
Re: (Score:2)
Re: (Score:2)
how Ophcrack is capable of generate immense tables of words
Of course it worked! (Score:2)
Burger WITH salt = You have a full security team recording who comes to visit you, and you have this barrier of protection with reinforced steel bars! PLUS - you have the right to make a call!
See? With salt it's much more secure!
Re: (Score:2)
Only copyists.