Is it possible to hack any password? | Real Bruteforce Experiment

Поділитися
Вставка
  • Опубліковано 2 гру 2024

КОМЕНТАРІ • 113

  • @Sumsubcom
    @Sumsubcom  Рік тому +19

    Have you ever encountered password theft and what were the consequences? Tell the most interesting stories under this comment ;)

    • @bharathpofficial3719
      @bharathpofficial3719 Рік тому +2

      Why aren't you using Arch Linux ? why Parrot or Kali ? is this because of Reachability ?
      edit: Basically why Debian ? [Don't just say, Why not ?]

    • @JoZaHandle
      @JoZaHandle Рік тому +1

      Can you do one on sim swapping?

    • @MStrong95
      @MStrong95 Рік тому +2

      Insert the web comic about password cracking from XKCD and how something like a cheap tool from the hardware store might in some cases be enough "motivation" to get someone to tell you their password. I'm not trying to approve of using violence or doing anything criminal but more just the theory that there's sometimes more than one kind of brute force attack

    • @cv507
      @cv507 Рік тому

      what about those röböttic? ´mözaic puzzles v??v
      after almost have a zentüree äfter bläde runäir you tell us you ´make ´securitti with phasyce ? ´är you outta yer eFFin mäinZ ^?^

    • @xila8861
      @xila8861 11 місяців тому

      May you explain how people use bruteforce on emails and other accounts when it should lock the account after few tries ?

  • @blaxbrian6877
    @blaxbrian6877 Рік тому +9

    kali has most of the tools youre using..... hash identifiers, hydra , john, mimikatz etc::::::: i think being security concious is the first step in staying safe while using computers

  • @jaxjax2011
    @jaxjax2011 11 місяців тому +15

    If you had a dataset of all the hashes of the password combinations you just described people using, would it not be faster to check a hash against this dataset than it is to re-hash every combination? If you had a 10TB storage unit, you could store about 4 billion hashes. You said that a graphics card could do about a million hashes a second, so 4 billion hashes would take about an hour on average to produce. If it takes 6 hours to go through all those common combinations, you'd just need 60TB of storage to have all of those combinations on hand. They would have to have an index to attach them to whatever password generates that hash in a different database. For 24 billion hashes (if that is our number) that would require an 11-bit or 2-byte index for each hash, which only increases the storage requirement by less than a terabyte. If your storage had a throughput of 3500 MB/s, then it would take you about 4.8 hours at most to find the correct hash, which is only 20% faster. Let's say you had the dataset of hashes divided among 10 computers, though, and you fed each of them the target hash. It would take less than half an hour to do the same work. If you had 100 computers, it would take less than 3 minutes. If you had a thousand computers, it would only take seconds. You could optimize the comparison with sorting algorithms as well. Only search the region of the dataset which matches the first byte of the hash and that'd speed it up by a factor of 256, which split among multiple computers could bring your time to crack down to milliseconds. Your server receives a hash, sends that hash to a farm that compares it to an optimized dataset of all common passwords, and returns the password near instantly.

    • @LifeExperimentalist
      @LifeExperimentalist 11 місяців тому +4

      Bro calm down

    • @Avighna
      @Avighna 11 місяців тому

      I was thinking something like this too, really the only explanation as to why this isn't being done is that it requires too much storage / maybe too much infrastructure

    • @mthia
      @mthia 10 місяців тому

      @@Avighna the main reason is that salt and pepper exist in hashing

    • @LeoNux-um7tg
      @LeoNux-um7tg 7 місяців тому

      if you're able to make those processors of separate computers work in parallel, it will be possible, but bruteforce isn't just word by word but combinations of previous symbols, letters and numbers. If you also meant to make the computers communicate through wireless or wired you're bound to the speed of that medium you are using, which is not noticeable until you make all those thousand of computers communicate on the same medium. This might work with the help of accelerators and make a program than utilize a simultaneous and heterogeneous computing.

    • @jaxjax2011
      @jaxjax2011 7 місяців тому

      @@mthia This makes sense. Salt changes the whole hash including the first characters afaik.

  • @PeterM-eh5ji
    @PeterM-eh5ji Рік тому +7

    Amazing vid! Was not aware of how bad is my cyber security xD

  • @Zac_Cole
    @Zac_Cole 8 місяців тому +1

    So you are telling me my 60 character random password is not going to get cracked so easily. I would have gone for a longer but the service had a character limit. Also since i didn't use a password generator or manager i store it in my primarily 256 bit encrypted server which could be a point of vulnerability, but if the hacker did so much work i would just give up.

  • @elmeromero303
    @elmeromero303 11 місяців тому +3

    Never had issues with Bruteforce on my (own) Servers/Services. Just lock Accounts (or/and IP) Policy after 5 unsuccessfully attems. If you "allow" Brute Force.. its up to you.

  • @dipperskrrt758
    @dipperskrrt758 11 місяців тому +2

    love the way how you organise and show things in videos , excellent

  • @ewellynn122
    @ewellynn122 Рік тому +2

    This video was helpful, at least now I can crack my own passwords if I forget them... And if I can't, that means that I've chosen really good passwords...

  • @karanskaushal
    @karanskaushal Рік тому +3

    Video quality and editing is amazing

  • @MarioCheong-lu5hb
    @MarioCheong-lu5hb Рік тому +2

    What programming language will need to learn to do for security in data center? I’m interested in Kotlin, will it help?

  • @AkiiiMatcha
    @AkiiiMatcha 6 місяців тому +2

    I love the Mr.Robot references

  • @josephfredbill
    @josephfredbill 7 місяців тому

    Great vid. Best Ive seen to explain this to non-techies. What isnt addressed 1. The computational complexity of muliple words in sequence (obfuscated with special chars) - a method many people (even geeks) use to remember the very few that must be remembered (hopefully one), 2. Combination of any method with bio-measurement (eg facial recognition, fingerprint recognition, iris recognition). How vulnerable is this if hashing is local to the device, 3. Apple’s new passkeys (sounds awfully like ssh to me).

    • @Sumsubcom
      @Sumsubcom  7 місяців тому +1

      Great points! Happy to have you with us

  • @sbcinema
    @sbcinema Рік тому +9

    The big disadvantage of two-factor identification is that you need an internet connection, which wouldn't work with an air gap system

    • @wiezumteufel9024
      @wiezumteufel9024 Рік тому +4

      What about a hardware based 2FA like a digital security key?

    • @JD2Q2Q
      @JD2Q2Q Рік тому

      ​@@wiezumteufel9024you mean like a token based login?

    • @basspuppy133
      @basspuppy133 11 місяців тому +2

      Hardware keys mate

  • @Crazyanimefan340
    @Crazyanimefan340 Рік тому +62

    please make a video of college server hacking🤔

  • @Tass...
    @Tass... Рік тому +7

    This video isn't going to age well. Check back here in 10 years when a 128 year password using 1000 GPUs can be cracked in 10 days by a simple laptop.

    • @wiezumteufel9024
      @wiezumteufel9024 Рік тому

      Until then we have geometric encryption as a standard. The Signal messenger already uses it so quantum computers cant crack their asymmetric encryption (which is even weaker than the symmetric encryption that is used in hard drives or password managers)

    • @Mango0fDoom
      @Mango0fDoom 11 місяців тому +3

      You are not going to have hardware speed up by a factor of about 3 million in 10 years. Assuming Moore's law doubling every 2 years, you are off by a factor of 100,000. Impressive.

  • @cluodalex2794
    @cluodalex2794 Рік тому +2

    What is the distro you used? I wanted to download it please 🌹

  • @Pretended1168
    @Pretended1168 10 місяців тому

    Luckily I changed my password after your short to the one you use in the video. Because It's super secure.

  • @eshankukreja112
    @eshankukreja112 Рік тому +6

    Love your videos ❤️

  • @ihateunicorns867
    @ihateunicorns867 Рік тому +4

    You can't go wrong with _Password1_

  • @amansaiyed5909
    @amansaiyed5909 Рік тому +6

    Sir, You cover the topics very well ❤ I have come to understand
    When will the next video come sir?❤
    Il

    • @Sumsubcom
      @Sumsubcom  Рік тому +2

      In a coupe of weeks! Thank you so much :)

  • @TalesYeap
    @TalesYeap 11 місяців тому

    What operation system are you using?

  • @surajpanditexe
    @surajpanditexe Рік тому +7

    Your videos made me a lot more privacy conscious 😅 thanks brother love from india 🇮🇳

  • @gelorphis
    @gelorphis Рік тому

    I saw the pwnagotchi video and was like "damn, instant sub"

  • @TalesYeap
    @TalesYeap 11 місяців тому

    What os are you using?

  • @shhamza-zk8uj
    @shhamza-zk8uj Рік тому

    Which os your use ?

  • @tanzilgargg
    @tanzilgargg Місяць тому

    Hey! Is it safe to apply on visual studio code and how to apply anonymously

  • @VulcanOnWheels
    @VulcanOnWheels 6 місяців тому

    Thanks for an interesting video. I do hope you found the cause of the distortions that were left into it.

  • @pravupritamlenka9215
    @pravupritamlenka9215 Рік тому

    Ur videos are the real valueable video ❤️

  • @pandit-jee-bihar
    @pandit-jee-bihar Рік тому +2

    No mention of quantum computers in the video, quantum computers would shorten those years to hours and days.
    Luckily there's no quantum computer yet

    • @jakubp123
      @jakubp123 Рік тому +4

      There already are, but they have too few qubits, aka they are not powerful enough yet

    • @wiezumteufel9024
      @wiezumteufel9024 Рік тому +2

      Quantum computers are mostly a concern for asymmetric encryption (messenger apps) not necessarily that much for symmetric encryption (PW managers, hard drives).
      And there are also new encryption methods approved by NIST that withstand quantum computers (e.g. geometric encryption)

  • @blogcorpo
    @blogcorpo 9 місяців тому

    Great video! ♥

  • @xTerminatorAndy
    @xTerminatorAndy Рік тому +1

    how can you do 2fa on offline devices? e.g. your hard disk

    • @xTerminatorAndy
      @xTerminatorAndy Рік тому +1

      ​@@carloareaserhow exactly do you add 2 factor on a hard disk? What I mean is protecting against the hard disk being taken out of your computer and attached to another. There is no 2fa for that

  • @ocsrc
    @ocsrc Рік тому +4

    Brute force is used to break phones all the time. Usually takes 3 days for a basic 4 digit.
    A few weeks for 6 digit

    • @neb_setabed
      @neb_setabed Рік тому +8

      How do you deal with the phones auto wait period after x amount of failed tries

    • @username65585
      @username65585 Рік тому

      @@neb_setabed Hackers find security bugs that allow that to be bypassed. Apple tries to find and fix these bugs. Then hackers try to find new bugs. It is a constant back and forth

    • @wiezumteufel9024
      @wiezumteufel9024 Рік тому

      ​@@neb_setabedthey circumvent it. Thats the reason why grapheneOS (most secure open source mobile operating system) is only put on Google Pixel devices. They have a special chip inside (Titan M2) that blocks multiple attempts and basically makes the phone unreadable if someone tries to remove it

    • @SaintIC
      @SaintIC 11 місяців тому

      @@neb_setabedthere’s ways too disable them or actually turn them to an extremely high value

  • @pixlyana
    @pixlyana 11 місяців тому

    u got new subs! 😍

  • @Nazwan-r7r
    @Nazwan-r7r 4 місяці тому

    tpm would handover the key, you just have to intercept it.

  • @Mr.Eminem
    @Mr.Eminem 11 місяців тому

    Technology will be better in future....for now brute force aint well...but with future tech and ai help... there'll be next level tech for cracking passwords

  • @skyboydenied4704
    @skyboydenied4704 Рік тому

    I miss the old days f modern warfare 2 when it was just the boys and a a Xbox 360👾

  • @Aman-cg2yt
    @Aman-cg2yt 11 місяців тому

    Can you explain what is
    'cicada 3301'
    And what if, if someone solve this puzzle then what he achievements

    • @kingvergaz
      @kingvergaz 11 місяців тому

      Check their old videos they talked about it.

    • @basspuppy133
      @basspuppy133 11 місяців тому

      They already talked about it and there's 50x other videos about the topic. It's already been done to death. There's more interesting things to talk about.

  • @landolabrum
    @landolabrum 11 місяців тому +2

    BRO, Please make your command prompts extend a few more keyframes on completion. damn, you say pause, but it’s next to impossible to screen shot them when you have some crazy transition play before I can screenshot the full output. thx bruh! love the video!!

  • @Im-mortal
    @Im-mortal Рік тому

    is Proton Pass is Good for storing crypto wallet keys ???

    • @fickthissut
      @fickthissut Рік тому

      It's as good as Proton security. I'd recommend Keepass (offline password manager).

    • @njpme
      @njpme 11 місяців тому +2

      Better create an encrypted vault then store it offline on multiple devices

  • @maathejayandyjohns1343
    @maathejayandyjohns1343 Рік тому

    Hi guys ,great channel, is it possible to recover wedding photos from a SD card, that has not been overwrite on.? Anyone can reply, thanks for any imput, just says , no history, SD card was put in then took out then put back in.

  • @dh2032
    @dh2032 5 місяців тому

    any one else feeling a little less secure, started, confident, but by the end, not so, the only thing I'm not that interesting enuth to need that much of working passward? but tech. and now AI getting better, no one password going to be safe, to point not password might as el not be there? how bout biometric fingers, eyes, clorict tracts (futurarma), at end the day the complated password text files?

  • @TheKnox159
    @TheKnox159 Рік тому

    Which linux is he using? Looks similar to blackarch but im not sure. if anyone knows pls comment

    • @cluodalex2794
      @cluodalex2794 Рік тому

      Ubuntu maybe

    • @tombrandis
      @tombrandis Рік тому

      I don't think you can tell with linux as its quite customisable- if you want it to look like that you can probably use any distro you want

  • @NateJGardner
    @NateJGardner 10 місяців тому

    This video makes me want to make an enterprise honeypot

  • @t0maz.m
    @t0maz.m Рік тому

    Why are there 1.8M like son 5k views?

  • @username65585
    @username65585 Рік тому +1

    Any password can be cracked with a wrench attack.

  • @ConnorKloop
    @ConnorKloop 6 місяців тому

    I forgot my password

  • @Shadow_zenin
    @Shadow_zenin Рік тому

    ty tip

  • @saileshrasaliya4721
    @saileshrasaliya4721 Рік тому

    We do bruteforce in Android password but only 3-5 try after it's lock for 30 min
    how to bypass and try unlimited trys

  • @jpphoton
    @jpphoton 3 місяці тому

    Toast.

  • @ionamygdalon2263
    @ionamygdalon2263 11 місяців тому

    Take a long phrase from the Bible and select an obscure language. This may be one of the hardest passwords to brute force.

  • @kucingBermisai
    @kucingBermisai Рік тому

    15627

  • @geroffmilan3328
    @geroffmilan3328 11 місяців тому

    I crimged pretty hard when you said authentifucation 😂
    It's *authentication* - no "if" in there.
    And offline attacks against whole-disk encryption are a lot harder if the encryption key is in the computer's Trusted Platform Module rather than on-disk.
    Having it on-disk is like hiding your front door key under the door mat.

  • @timur.shhhhh
    @timur.shhhhh 8 місяців тому

    but in the end, the password “1111” is still the most secure, because Bruteforce does not check this combination

    • @Zac_Cole
      @Zac_Cole 8 місяців тому

      What do you mean

    • @ParaBellX
      @ParaBellX 6 місяців тому

      😐

  • @vinnypistone.
    @vinnypistone. Рік тому +2

    Let's put 10 ads in a 16 min video what a classic.. you clowns