TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

Password Safety & Security: Passwords vs Passphrases

2022-05-05 · Read original ↗

ATT&CK techniques detected

5 predictions
T1056.001Keylogging
99%
“value as the one they have stolen. while this sounds tedious, password cracking tool, such as hashcat, are capable of calculating billions of hashes per second on a single computer. 4 renting cloud computing services allows security researchers and threat actors, alike, to perfor…”
T1110.002Password Cracking
83%
“security for us as users, and for the organizations we work for. we ’ ll then offer some password best practices to help you remain safe. password cracking traditionally, attackers have attempted to guess passwords by, essentially, guessing them one character at a time. the gener…”
T1110.002Password Cracking
65%
“##9, 788, 602, 740, 026, 717, 047, 105, 681 ). now this is a serious looking number! the base - 2 equivalent is around 2133. finally, we have the complexity we need from our password! or do we...? passphrase cracking while password attacks are far more common, a number of tools e…”
T1110.002Password Cracking
38%
“passphrase cracking, but is limited, even with 22 million entries. an alternative approach is to use the prince algorithm to create passphrases which are then sent to hashcat to calculate the hashes. 9 at its core, this allows attackers to supply a list of single words which the …”
T1110.002Password Cracking
32%
“as a ‘ hash ’. a hash is the output of a function which converts data of any length into a fixed length string. hashes are theoretically impossible to reverse so if an attacker steals a hashed password for their intended victim they have no choice but to try to send many differen…”

Summary

NIST and the UK's NCSC currently recommend not enforcing frequent password changes, and instead to use longer passphrases over shorter passwords. We take a look at the math to see what really makes sense, and arrive at some straightforward suggestions.