Using this password as an example (for length and character type), the
number of possibilities
would be (26 lowercase+26 uppercase+10 numerals+6 special characters)^8
(assuming that the
period at the end of the sentence isn't part of the password).  This is a
total of 457,163,239,653,376
possibilities (compare this with DES encryption at 56-bit which we all know
can be brute forced at
72,057,594,037,927,936 possibilities).  If you have the period at the end
2^54 < 68^9 < 2^55 possibilities.
Better but still fewer possibilities than 56-bit encryption...


Chris Hastings
Manager, Network Security
Network Computing Services
Vanderbilt University Medical Center
[EMAIL PROTECTED]


                                                                                       
           
                    Bobby Brown                                                        
           
                    <bbrown@allensysgrou        To:     "'[EMAIL PROTECTED] '"  
           
                    p.com>                      <[EMAIL PROTECTED]>             
           
                    Sent by:                    cc:                                    
           
                    firewalls-owner@List        Subject:     RE: NT password 
encryption & name    
                    s.GNAC.NET                  service                                
           
                                                                                       
           
                                                                                       
           
                    12/20/2000 11:14 AM                                                
           
                                                                                       
           
                                                                                       
           


 You must have had very few users or an extremely powerfull server to crack
by brute force the passwords. The password you referenced has 4 of the
recommended characters I wish every user used. Upper and lower case
characters, special characters, and numbers. What cracking software did you
use to do this ?


Bobby Brown

-----Original Message-----
From: Carl Ma
To: [EMAIL PROTECTED]
Sent: 12/20/00 12:00 PM
Subject: NT password encryption & name service

Hello all,

After running password cracking program on our W2000 PDC server, 98%
passwords
are cracked out, even some very complicate passwords like - X1#!h0a_.

Is it attribute to the W2000 encryption method? I would like to persuade
my boss
using LDAP as name service. Appreciate any information & idea! I will
summarize.

Thanks & Merry Christmas!

carl

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]




-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to