Page 3 of 4 FirstFirst 1234 LastLast
Results 21 to 30 of 35

Thread: KeePass pasword vault

  1. Administrator Bunni's Avatar
    Join Date
    08-29-07
    Posts
    14,279
    Post Thanks / Like
    Blog Entries
    7
    Stat Links

    KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault
    Gamer IDs

    Steam ID: bunni Bunni's Originid: Dr_Bunni
    #21

    Re: KeePass pasword vault

    Brute force on most sites is a thing of the past. Most sited have a security lockout if your password is failed to much. Even with 10,000 slave bots at 5 guesses each, per 15 minutes, it's still a stupid about of time. Hell I think most sites will lock your account if too many failed attempts occur and force you to reactivate.


    Most brute forcing happens on encrypted files that the hacker has acquired locally. And is trying to hack locally.

    As for 256bit aes, I'm not familiar with it but it probably stands no chance up against modern gpu cracking approaches look at the latest specs for nvidia titan cards

    Mobile-

  2. Registered TeamPlayer hannibal's Avatar
    Join Date
    08-20-07
    Location
    Tempe, Arizona, United States
    Posts
    1,418
    Post Thanks / Like
    Blog Entries
    2
    Stat Links

    KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault
    Gamer IDs

    PSN ID: aws4y Steam ID: hannibal_smith_1984 hannibal's Originid: hannibal_smith15
    #22

    Re: KeePass pasword vault

    Quote Originally Posted by Bunni View Post
    Brute force on most sites is a thing of the past. Most sited have a security lockout if your password is failed to much. Even with 10,000 slave bots at 5 guesses each, per 15 minutes, it's still a stupid about of time. Hell I think most sites will lock your account if too many failed attempts occur and force you to reactivate.


    Most brute forcing happens on encrypted files that the hacker has acquired locally. And is trying to hack locally.

    As for 256bit aes, I'm not familiar with it but it probably stands no chance up against modern gpu cracking approaches look at the latest specs for nvidia titan cards

    Mobile-
    256bit RSA has been dead for awhile, but 256bit AES block cypher is still very much alive, the best known attacks are on the order of 2^254 ops according to wikipedia.

    Advanced Encryption Standard - Wikipedia, the free encyclopedia

    So if we play this game the number of flops of a GTX titan is 4.5 tflops. We can assume this is the floor for integer performance, but within an order of magnitude or so. Given this we get something like 6^63 seconds for key recovery. this is approximately 10^46 more time than the universe has existed. I would say this is a very conservative estimate since I don't know if the code for such an attack can be effectively sped up by a GPU.

    -H

    ed. Man, had to open matlab to do that, but I love playing these games
    Last edited by hannibal; 07-05-13 at 06:29 PM.

    Standard Disclaimer: 150% of what I say is bullshit.

  3. Registered TeamPlayer Gumby's Avatar
    Join Date
    07-24-06
    Location
    Colorado
    Posts
    5,025
    Post Thanks / Like
    Blog Entries
    6
    Stat Links

    KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault
    Gamer IDs

    Gamertag: tFHoP Gumby PSN ID: tFHoP_Gumby Steam ID: gumbykey1337 Gumby's Originid: Gumby_C2C
    #23

    Re: KeePass pasword vault

    Quote Originally Posted by iLLusioN View Post
    Keepass is amazing. I need to get it allowed at work...would make things significantly easier with 21381092348021984 accounts and rolling passwords every 30 days for all of them.
    This times 1000. I (not exaggerating) have 19 usernames and passwords at work just for network access. That's not counting the user names and passwords to sites and services on those networks. All the passwords get changed regularly and they all must be long and complex. It's maddening. Throw in my personal stuff for bills, banks, shopping, mail, social sites and games and it's a major headache. And if you want to be secure, everything needs a unique password so if say LinkedIn gets hacked, the assholes don't also get your PayPal. I hate those guys so much...

    Sent from my Nexus 7 using Tapatalk
    Sleep, eat, conquer, meditate, repeat.

  4. Registered TeamPlayer Gumby's Avatar
    Join Date
    07-24-06
    Location
    Colorado
    Posts
    5,025
    Post Thanks / Like
    Blog Entries
    6
    Stat Links

    KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault
    Gamer IDs

    Gamertag: tFHoP Gumby PSN ID: tFHoP_Gumby Steam ID: gumbykey1337 Gumby's Originid: Gumby_C2C
    #24

    Re: KeePass pasword vault

    Quote Originally Posted by hannibal View Post
    256bit RSA has been dead for awhile, but 256bit AES block cypher is still very much alive, the best known attacks are on the order of 2^254 ops according to wikipedia.

    Advanced Encryption Standard - Wikipedia, the free encyclopedia

    So if we play this game the number of flops of a GTX titan is 4.5 tflops. We can assume this is the floor for integer performance, but within an order of magnitude or so. Given this we get something like 6^63 seconds for key recovery. this is approximately 10^46 more time than the universe has existed. I would say this is a very conservative estimate since I don't know if the code for such an attack can be effectively sped up by a GPU.

    -H

    ed. Man, had to open matlab to do that, but I love playing these games
    But they don't just brute force the hash. They start with using a dictionary of passwords to weed out the easy ones. And don't think that 1337 speak makes your password good against this type of dictionary. That alone nets them what they want. Then they have plenty of time to use the power of their distributed computer network of zombies to break the rest. There is no password security. Two factors are needed for decent security.

    Sent from my Nexus 7 using Tapatalk
    Sleep, eat, conquer, meditate, repeat.

  5. Registered TeamPlayer Gumby's Avatar
    Join Date
    07-24-06
    Location
    Colorado
    Posts
    5,025
    Post Thanks / Like
    Blog Entries
    6
    Stat Links

    KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault
    Gamer IDs

    Gamertag: tFHoP Gumby PSN ID: tFHoP_Gumby Steam ID: gumbykey1337 Gumby's Originid: Gumby_C2C
    #25

    Re: KeePass pasword vault

    http://arstechnica.com/security/2013...our-passwords/

    Everyone should read the original story and the follow up I linked. It's just too easy.

    Sent from my Nexus 7 using Tapatalk
    Sleep, eat, conquer, meditate, repeat.

  6. Registered TeamPlayer Partyball's Avatar
    Join Date
    04-24-08
    Posts
    3,159
    Post Thanks / Like
    Blog Entries
    2
    Stat Links

    KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault
    Gamer IDs

    PSN ID: Partyball Steam ID: Partyball
    #26

    Re: KeePass pasword vault

    Quote Originally Posted by Gumby View Post
    But they don't just brute force the hash. They start with using a dictionary of passwords to weed out the easy ones. And don't think that 1337 speak makes your password good against this type of dictionary. That alone nets them what they want. Then they have plenty of time to use the power of their distributed computer network of zombies to break the rest. There is no password security. Two factors are needed for decent security.

    Sent from my Nexus 7 using Tapatalk
    They also have rainbow tables.

  7. Registered TeamPlayer hannibal's Avatar
    Join Date
    08-20-07
    Location
    Tempe, Arizona, United States
    Posts
    1,418
    Post Thanks / Like
    Blog Entries
    2
    Stat Links

    KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault
    Gamer IDs

    PSN ID: aws4y Steam ID: hannibal_smith_1984 hannibal's Originid: hannibal_smith15
    #27

    Re: KeePass pasword vault

    Quote Originally Posted by Gumby View Post
    But they don't just brute force the hash. They start with using a dictionary of passwords to weed out the easy ones. And don't think that 1337 speak makes your password good against this type of dictionary. That alone nets them what they want. Then they have plenty of time to use the power of their distributed computer network of zombies to break the rest. There is no password security. Two factors are needed for decent security.

    Sent from my Nexus 7 using Tapatalk
    This post was about the security of AES via key reovery. My Keepass file is two factor, requiring a key and a master password.

    -H
    Last edited by hannibal; 07-06-13 at 02:43 PM.
    Likes Alundil liked this post

    Standard Disclaimer: 150% of what I say is bullshit.

  8. Registered TeamPlayer hannibal's Avatar
    Join Date
    08-20-07
    Location
    Tempe, Arizona, United States
    Posts
    1,418
    Post Thanks / Like
    Blog Entries
    2
    Stat Links

    KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault
    Gamer IDs

    PSN ID: aws4y Steam ID: hannibal_smith_1984 hannibal's Originid: hannibal_smith15
    #28

    Re: KeePass pasword vault

    Quote Originally Posted by Partyball View Post
    They also have rainbow tables.
    Rainbow tables work by pre-computing unsalted hashes of known plain text. This is why salts have become standard.

    -H

    Standard Disclaimer: 150% of what I say is bullshit.

  9. Registered TeamPlayer Gumby's Avatar
    Join Date
    07-24-06
    Location
    Colorado
    Posts
    5,025
    Post Thanks / Like
    Blog Entries
    6
    Stat Links

    KeePass pasword vault KeePass pasword vault KeePass pasword vault KeePass pasword vault
    Gamer IDs

    Gamertag: tFHoP Gumby PSN ID: tFHoP_Gumby Steam ID: gumbykey1337 Gumby's Originid: Gumby_C2C
    #29

    Re: KeePass pasword vault

    Quote Originally Posted by hannibal View Post
    Rainbow tables work by pre-computing unsalted hashes of known plain text. This is why salts have become standard.

    -H
    Salts are not secure either. Better but still not two factors.

    Sent from my Nexus 7 using Tapatalk
    Sleep, eat, conquer, meditate, repeat.

  10. Registered TeamPlayer
    Join Date
    04-17-07
    Posts
    20,817
    Post Thanks / Like
    Blog Entries
    4
    #30

    Re: KeePass pasword vault

    Quote Originally Posted by Bunni View Post
    i used to use keypass. moved to browser and webbassed pw managers that integrate much better and allow more fluid sharing. Went to mitto, they were meh (though i loved how you can customize the fields it remembers and store more than just username and pw, aka ip+service+username+password for box information). But settled on lastpass for website crap. It cost money for mobile devices but is free for browser...



    Then again, i've never had a password that is even remotely in the dicitonay. I use accented letters when i can and symbols in every pass.

    Key pass gotten any better?
    Been doing the same thing. Started on keypass, desktop/phone using dropbox to sync, worked but cumbersome, tried some different browser based... Settled on lastpass.

    Sent via highly charged bolt of electricity.

Page 3 of 4 FirstFirst 1234 LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Title