lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4176092A.7060704@paradigmo.com> From: stephane.nasdrovisky at paradigmo.com (stephane nasdrovisky) Subject: Senior M$ member says stop using passwords completely! Todd Towles wrote: >I was under the understand that passwords of over 14 characters were >stored with a more secure hash, therefore 14 characters passwords were >harder to crack, due to the more secure hash. Windows will create two >different hashes for passwords shorting than 14 characters, I do >believe. > > If my memory is right, lm passwords are hashed as 2*7 uppercase bytes (which is not the same as 14 bytes, it's easier to bf) If lm passwords are enabled, even longer passwords will collide with a 14 characters password (as far as you're more interested in accessing one's account than knowing its dog's name, i.e. if your pass is "My name is bond, james bond!", using "MY NAME IS BON" will give you the access you diserve)! Back in the nt 4.0 time, it was required to disable lm passwords (w95 compatibility issue) in order to have stronger passwords (if nt password fails, lm password is checked). >Just use a non-printable character in your password and cracking is >useless...if they crack it, they can't read what they cracked. ;) > >
Powered by blists - more mailing lists