0% found this document useful (0 votes)
69 views6 pages

Brute Force Attack Estimator

This document discusses password cracking and provides a password strength calculator. It explains that brute force dictionary attacks can crack average passwords in seconds by trying common words. The calculator allows estimating the time needed to crack passwords via brute force by inputting the password length and composition. Shorter, predictable passwords can be cracked much faster than long, random combinations as cracking tools start by trying most likely patterns.

Uploaded by

mohsen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLS, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views6 pages

Brute Force Attack Estimator

This document discusses password cracking and provides a password strength calculator. It explains that brute force dictionary attacks can crack average passwords in seconds by trying common words. The calculator allows estimating the time needed to crack passwords via brute force by inputting the password length and composition. Shorter, predictable passwords can be cracked much faster than long, random combinations as cracking tools start by trying most likely patterns.

Uploaded by

mohsen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLS, PDF, TXT or read online on Scribd
You are on page 1/ 6

http://www.mandylionlabs.com/index15.

htm

USE TO ESTIMATE TIME FOR THE MORE DIFFICULT BRUTE FORCE ONLY
(DICTIONARY LOOKUP ATTACKS WHICH ARE TRIED USUALLY FIRST TAKE SECONDS
AND GET AN AVERAGE OF 25% of ALL PASSWORDS)
Click here to go to MandylionLabs Web Site
Character
Length Sorted by(see "how to use this calculator" tab): Set Size Entropy or Keyspace of password
Upper Case Letters 26 1
Lower Case Letters 26 1
Numbers 10 1
Special Characters 32 1
or Purely Random Combo of Alpha/Numeric 62 1
or PURELY Random Combo of Alpha/Numeric/Special 94 1
ASE or WORD SUBJECT TO A DICTIONARY ATTACK 5 1

password length in Characters 0 1 or


#N/A
The only USER INPUT AREA -- insert
password parameters here see tab:
'How to Use this Calculator" for further detail ./2 Reduce Keyspace Search by
Law of Averages
Total Workload in Floating
1 Point Processes

Average Assigned Workload/Computer

Number of Keys a Desktop Computer Can Try efficiently in an 17 billion tries in an hour (Very
Hour(=2*2^33) 17,179,869,184 High Performance)

Estimated Gross Number of hours to Crack 0.00 hours


On Distributed Level: 0.00 days
If Number of Machines Employed were:
(per distributed.net efficient workload 10.00 0.00 hours
for 1/2 hour is now(2202) 2^33
keyspace search(was 2^28) 50.00 0.00 hours
100.00 0.00 hours
250.00 0.00 hours
500.00 0.00 hours
1,000.00 0.00 hours
10,000.00 0.00 hours
100,000.00 0.00 hours
http://www.mandylionlabs.com/index15.htm

The red area is the only area of user input -- The calculator is organized to give you two ways
composition
-- the first way is by separately putting in the number of alpha / numeric / special characters in th
-- on each of their separate lines (and seeing the total adds up to you total password length); and

Click here to --the 2nd way just by putting in the total number of positions in the password on either the "rando
go to the "random combo" alpha/numeric/special character line if special characters are included- or th
MandylionLa dictionary attack line
bs Web Site
The result of the two methods can vary widely -- for instance if I have a password comprised of 4
1 special character -- if they were entered separately ( and made sure the total for password length
14 billion positions in the keyspace and about .43 of an hour or about 25 minutes to get that crac
the random combo field -- it would show in the "gazillions" and would take about 177k hours to

Why the difference? -- simple -- the calculator tries to approximate what L0pht crack algorithm
engineering -- i.e. a propensity to make even supposedly "strong" manually made up passwords-
giving the hacker an educated guess on the predictable pattern of just its composition -- which gi
start in where to start the brute force attack -- the logic is -- the in brute force mode you are resol
position in the keyspace in finding the answer, why not start that search in the most likely areas --
characters, patterns, etc.

For instance, the cracking programs rely on the fact that a typical user will probably not start a pa
in the first position but will put nearly always put it somewhere near the end of the space-- theref
amounts of cracking time with a cracking program that is written to contemplate this - so that it w
guessing attack on a password that assumes a special character is in the first position, or a user wo
that has a password composition policy -- will almost always subconsciously mimic the wording
trying to comply with it -- i.e. if policy says it must contain at least 8 characters -with at least one
(alpha upper, alpha lower, numeric, and special characters) represented -- users under that policy
hence the cracking programs will improve their odds of cracking speed by doing these first) crea
follows that order in the policy - i.e. an 8 character password that looks like this -- As1%1234 wh
compliance with policy out of the way "up front" then a suffix with something easy to remember

In essence, these cracking programs go through a protocol of routines or hacking steps from great
greatest effort/least reward (i.e. purely random) hoping to get lucky and snag an answer before th
keyspace.

The following is a good reference on how L0phtcrack uses logic such as this to take educated gue
should first start looking for a matching pattern.
http://online.securityfocus.com/infocus/1319
ized to give you two ways to enter a password's

ic / special characters in the password-- if they are known


otal password length); and

ssword on either the "random combo" alpha/numeric line or


haracters are included- or the phrase or word subject to a

a password comprised of 4 upper alphas and 3 numbers and


he total for password length read 8) -- it would show about
25 minutes to get that cracked if however, I just put 8 in
d take about 177k hours to crack --

what L0pht crack algorithms take advantage of --social


ually made up passwords- easy to remember and thereby
ts composition -- which gives them a tremendous head
e force mode you are resolved to trying each and every
h in the most likely areas -- i.e. standard polices, repeating

will probably not start a password with a special character


he end of the space-- therefore you can shave enormous
ntemplate this - so that it will not start a brute force
e first position, or a user working within an environment
ciously mimic the wording of the policy when they are
haracters -with at least one of each of the character sets
d -- users under that policy will then most likely -(and
d by doing these first) create a password that literally
s like this -- As1%1234 where they get their "minimum
mething easy to remember ---1234

or hacking steps from greatest reward/least effort to finally


d snag an answer before they have to go through the entire

as this to take educated guesses at where it the keyspace it


Mean Time to Brute Force Attack a Key Space
worksheet http://www.mandylionlabs.com/index15.htm

Click here to go to MandylionLabs Web Site

Definitions
Plain Text A series printable keyboard characters (i.e. like a
password)

Password A series of printable keyboard characters used to


uniquely identify a person or device as having
authorization to access resources or data or space

Cipher Text Plain text which has been encrypted by either


encryption software or transparently via the browser,
operating system or data communications utility. Also
see encrypted stream.
A series of 1 and 0's representing the transmission of
Encrypted Stream encrypted plain text which cannot be decoded to arrive
back at its plain text equivalent
The Encrypted
Hash or One Way Hash See Encrypted Stream or Cipher text attempting to be
decoded (cracked) via comparison with other know
Target Cipher Text encrypted streams

Encoding Plain Text The process of encoding plain text to cipher text

Keyspace
The total number of possible comparisons to an
encrypted stream

Flops/Megaflops/Gigaflops
Floating point operations/second -- a measure of a
CPU's processing power doing complex calculations;
Mega is million; Giga is billion; Rule of thumb, most
desktop machines now can perform at several hundred
megaflops/sec -- and the high end machines have just
recently broken the gigaflop threshold. Can only be
empirically calculated via benchmark tests which are
performed on all major CPUs and results published
A single attempt at Encoding Plain Text and
Comparisions, Tries or Guesses Comparing the Result to a Target Cipher Text to see if
they are equal-rule of thumb- a single attempt is
approximately equal to single floating point processing
step

Total Workload The calculated number tries necessary to break a given


code (keyspace/2)

Average Assigned Workload


For distributed processing applications, the average
portion of the total workload assigned to be solved by
a particular CPU. Assigned workloads take into
account average CPU size and capability, average
CPU utilization, average time online and available for
processing. Current rule of thumb is 2 to the 33 power
for 1/2 hour of computing time per session at less than
10% utilization.

Entropy See Keyspace

Code Breaking Accepted 50/50 Chance - i.e. a code has an equal chance of
Law of Averages being broken anywhere throughout the entire
Keyspace (i.e. could be on first try or last but average
is 1/2 way through all tries)

million 1,000,000 1*10^6 6


billion 1,000,000,000 1*10^9 9
trillion 1,000,000,000,000 1*10^12 12
quadrillion 1,000,000,000,000,000 1*10^15 15
qunitrillion 1,000,000,000,000,000,000 1*10^18 18
sextillion 1,000,000,000,000,000,000,000 1*10^21 21
septillion 1,000,000,000,000,000,000,000,000 1*10^24 24
octillion 1,000,000,000,000,000,000,000,000,000 1*10^27 27
nonillion 1,000,000,000,000,000,000,000,000,000,000 1*10^30 30
decillion 1,000,000,000,000,000,000,000,000,000,000,000 1*10^33 33

You might also like