AI Can Crack Most Common Passwords In Less Than A Minute https://www.homesecurityheroes.com/ai-password-cracking/
2023 Password Cracking: How Fast Can AI Crack Passwords?

We used an AI password cracker to run through 15M passwords to find out how long it would take AI to crack your password in 2023. Here what we found.

@nixCraft does this take into account common mitigations like account being disabled after x failures or exponential time back off ?

I’m not arguing for crap passwords, but realistic attack simulations.

@nixCraft if the attack simulation is based on having the hashes and reversing them does it take into account using a per user salt from a different store than the password hash store ?

@walkerb @nixCraft The methodology section of their page is insufficient. My strong presumption is this is attempting to model the "I got the (salted) hash" threat model, and not the online attack model.

Frankly I don't believe their results given an actually random password. I DO believe it given a human generated password, as the lack of entropy in our brains should be modelable by a similar lack of entropy in a LLM.

The callout here should be "let your password manager do it's thing"

@walkerb @nixCraft IOW, I believe the relevant XKCD still holds. I think this is just a restatement of the entropy calculation expressed in that comic....

https://xkcd.com/936/

AS LONG AS THE WORDS ARE TRULY RANDOM!
(human generated pass phrases seem highly likely to be vulnerable to a similar attack)

Password Strength

xkcd
@walkerb @nixCraft (my model/impression is that salting doesn't materially impact your hash rate...it just impedes rainbow table attacks.)

@kilpatds @nixCraft properly used salt (stored separately from the password hash, requiring different credentials to access, random for each user account) would move all of the passwords further up the table.

So an 8 character password would effectively be a 20+ character password...

@walkerb @nixCraft That assumes that you can't get the salt when you get the hash ... which for most breaches I'm aware of, seems like a fraught assumption.

(I mean, I guess you *could* store the salt in a cookie on the user's system, and literally not have it otherwise, and just brute-force-it whenever a user logs in from a new system, but ... I've not heard of anyone implementing such a system)

@kilpatds @nixCraft depends on the depth of the compromise.

I typically store salts in a different storage modality to the user accounts. Requiring a different set of credentials and keys to access.

I detest AI sensationalism - if what you're actually telling me is you have a better word list then color me less impressed.

@walkerb @nixCraft https://elk.zone/mastodon.social/@kilpatds/110181481022106276

"A better word list" seems like a reasonable approximation. @kevinbowrin linked to the paper: https://arxiv.org/abs/1709.00440

My quick take is "an AI trained on all cracked passwords was able to generate cracked passwords"... which ... uh ... yes?

Douglas Kilpatrick (@[email protected])

Attached: 1 image Reading the methodology behind https://www.homesecurityheroes.com/ai-password-cracking/ and thinking of this image, for no particular reason.

Mastodon

@walkerb @nixCraft from the page, it seems like this is just a better wordlist based on RockYou.

> The technology was trained using the RockYou dataset, a data group used to train intelligent systems on password analysis. After training, GAN was able to leverage the acquired knowledge to create new sample passwords that follow the neural network distribution.

@walkerb @nixCraft Normal cracking is vs the hash not against the login portal.

This is a realistic attack simulation.

@DuncanWatson @nixCraft respectfully disagree - if its against has, then a well used salt will move weak passwords further up the table.

So an 8 character password would effectively be a 20+ character password...

This is simply sensationalism.

@walkerb @nixCraft I agree that the chart is too simple. But dealing with salts and other issues is absolutely normal in the cracking world and has been for over 20 years.

An 8 character password though is pretty terrible. Length of your password is your best defense. There is no way I could imagine anyone justifying 8 character passwords in the modern world.

@walkerb @nixCraft OTOH charts like this with simple axis and predicting years or millenia to break password with some characteristics are BS.

At least we are passed the days that only 8 significant characters matter.

Length, length, length is your simplist defense.

@DuncanWatson @nixCraft

I'm not arguing for bad passwords.

I'm arguing that this is AI sensationalism for what amounts to a better word list...

@walkerb @nixCraft I agree, the AI part of this is 100% BS. Especially since it isn't bringing in any more inputs. Like if you told me you had a system that could target the CEOs passwords based on their profile of said CEO. I would then pay attention. That is very believable without AI.

Heck just building a matrix of your target and recently security breaches will get you a lot of hits.

@DuncanWatson @walkerb the more interesting part is, as usual, not with so much eyecandy so it didn't make it. This goes back to a paper in 2017: https://doi.org/10.48550/arXiv.1709.00440

Brief overview is that it "guesses" by adding typical patterns used for "save passwords", like l33tsp34k, for decades.

Here is a repo putting it to a test https://github.com/brannondorsey/PassGAN

…mebbe that website is even running this in the background 🤷

Bottom line is IMHO that someone got to show their CSS skills here and that's it 🤓

PassGAN: A Deep Learning Approach for Password Guessing

State-of-the-art password guessing tools, such as HashCat and John the Ripper, enable users to check billions of passwords per second against password hashes. In addition to performing straightforward dictionary attacks, these tools can expand password dictionaries using password generation rules, such as concatenation of words (e.g., "password123456") and leet speak (e.g., "password" becomes "p4s5w0rd"). Although these rules work well in practice, expanding them to model further passwords is a laborious task that requires specialized expertise. To address this issue, in this paper we introduce PassGAN, a novel approach that replaces human-generated password rules with theory-grounded machine learning algorithms. Instead of relying on manual password analysis, PassGAN uses a Generative Adversarial Network (GAN) to autonomously learn the distribution of real passwords from actual password leaks, and to generate high-quality password guesses. Our experiments show that this approach is very promising. When we evaluated PassGAN on two large password datasets, we were able to surpass rule-based and state-of-the-art machine learning password guessing tools. However, in contrast with the other tools, PassGAN achieved this result without any a-priori knowledge on passwords or common password structures. Additionally, when we combined the output of PassGAN with the output of HashCat, we were able to match 51%-73% more passwords than with HashCat alone. This is remarkable, because it shows that PassGAN can autonomously extract a considerable number of password properties that current state-of-the art rules do not encode.

arXiv.org
@DuncanWatson @walkerb @nixCraft not just length but complexity. An 18 character password with just numbers or just letter or both is not nearly as good as some others. I didn't check the methodology but for me it was also just fun. I know I have strong passwords. Does accuracy matter as such? What would matter is if your password was guessed/cracked/whatever term you wish to use.
@nixCraft just tried with a password generated by Firefox
@nixCraft what about login with CAPTCHA :)
PassGAN: A Deep Learning Approach for Password Guessing

State-of-the-art password guessing tools, such as HashCat and John the Ripper, enable users to check billions of passwords per second against password hashes. In addition to performing straightforward dictionary attacks, these tools can expand password dictionaries using password generation rules, such as concatenation of words (e.g., "password123456") and leet speak (e.g., "password" becomes "p4s5w0rd"). Although these rules work well in practice, expanding them to model further passwords is a laborious task that requires specialized expertise. To address this issue, in this paper we introduce PassGAN, a novel approach that replaces human-generated password rules with theory-grounded machine learning algorithms. Instead of relying on manual password analysis, PassGAN uses a Generative Adversarial Network (GAN) to autonomously learn the distribution of real passwords from actual password leaks, and to generate high-quality password guesses. Our experiments show that this approach is very promising. When we evaluated PassGAN on two large password datasets, we were able to surpass rule-based and state-of-the-art machine learning password guessing tools. However, in contrast with the other tools, PassGAN achieved this result without any a-priori knowledge on passwords or common password structures. Additionally, when we combined the output of PassGAN with the output of HashCat, we were able to match 51%-73% more passwords than with HashCat alone. This is remarkable, because it shows that PassGAN can autonomously extract a considerable number of password properties that current state-of-the art rules do not encode.

arXiv.org
@nixCraft for mine it'd take 2mn years xD
@nixCraft The joys of hyperbole. Against a random password, AI won't help at all. Not that it is AI. Just Machine learning.

@nixCraft How is it any different than a regular brute force with a wordlist? do they only generate better wordlists?

Let's say they want to crack my mastodons instance admin password. How is it different then?

@nixCraft After further reading, turns out they just built a better wordlist based on RockYou.
@nixCraft luckily my passwords are commonly 25 chars long, with soecial letters and so on. At least if the site supports it... There are still sites out there with a character limit of 8....
@nixCraft 2 weeks for "12345äöüß"? That's quite bad.
@diesch @nixCraft "password123" would take 38 years... This is just dumb.
@Varpie It seems it's just doing some kind of brute force attack without much knowledge about real-world passwords.

@nixCraft
The 17 Upper & Lower Char time is significantly smaller than 16 Char...

The color coding makes that stick out like a sore thumb, it doesn't happen elsewhere on the chart.

Is there an explanation for that?

@nixCraft This table means nothing... What hardware does it take 2 weeks to crack the password on? A laptop? A GPU cluster?
@nixCraft uh? Almost the same as back in 2020 with plain old brute force and with no #AI?
Something went wrong or what? 😄
@nixCraft Okay, my blog password would take 187 million years. I don't expect to be blogging by then, anyway.
@nixCraft Fun! .. I think I'm good. AI would need 6 quadrillion years. Not my exact password obviously but in the form of what I use.