Is it possible to hack any password? | Real Bruteforce Experiment

preview_player
Показать описание

In this experimental video, we’ll explore the possibility of hacking any password using bruteforce. You're gonna see a step-by-step breakdown of the process. We showcase the tools and techniques commonly used by hackers in order to show the vulnerabilities in password security.

You will find out about practical tips on creating strong, unique passwords and explore additional measures like two-factor authentication.

Don't miss out! Watch now and elevate your knowledge of password security.

#bruteforce #bruteforcing #hacking #sumsub #wifi

00:00 Time to hack a password
02:45 What is offline bruteforcing?
03:52 How can you be hacked?
04:42 What is a Hash?
06:24 Bruteforcing process
13:17 Verification Tool
14:02 Tips from Bruteforcing
16:32 The End

Sumsub — empowering compliance and anti-fraud teams to fight money laundering, terrorist financing, and online fraud.

More about us:
Рекомендации по теме
Комментарии
Автор

Have you ever encountered password theft and what were the consequences? Tell the most interesting stories under this comment ;)

Sumsubcom
Автор

kali has most of the tools youre hash identifiers, hydra, john, mimikatz i think being security concious is the first step in staying safe while using computers

blaxbrian
Автор

please make a video of college server hacking🤔

Crazyanimefan
Автор

If you had a dataset of all the hashes of the password combinations you just described people using, would it not be faster to check a hash against this dataset than it is to re-hash every combination? If you had a 10TB storage unit, you could store about 4 billion hashes. You said that a graphics card could do about a million hashes a second, so 4 billion hashes would take about an hour on average to produce. If it takes 6 hours to go through all those common combinations, you'd just need 60TB of storage to have all of those combinations on hand. They would have to have an index to attach them to whatever password generates that hash in a different database. For 24 billion hashes (if that is our number) that would require an 11-bit or 2-byte index for each hash, which only increases the storage requirement by less than a terabyte. If your storage had a throughput of 3500 MB/s, then it would take you about 4.8 hours at most to find the correct hash, which is only 20% faster. Let's say you had the dataset of hashes divided among 10 computers, though, and you fed each of them the target hash. It would take less than half an hour to do the same work. If you had 100 computers, it would take less than 3 minutes. If you had a thousand computers, it would only take seconds. You could optimize the comparison with sorting algorithms as well. Only search the region of the dataset which matches the first byte of the hash and that'd speed it up by a factor of 256, which split among multiple computers could bring your time to crack down to milliseconds. Your server receives a hash, sends that hash to a farm that compares it to an optimized dataset of all common passwords, and returns the password near instantly.

jaxjax
Автор

Never had issues with Bruteforce on my (own) Servers/Services. Just lock Accounts (or/and IP) Policy after 5 unsuccessfully attems. If you "allow" Brute Force.. its up to you.

elmeromero
Автор

Amazing vid! Was not aware of how bad is my cyber security xD

PeterM-ehji
Автор

Great vid. Best Ive seen to explain this to non-techies. What isnt addressed 1. The computational complexity of muliple words in sequence (obfuscated with special chars) - a method many people (even geeks) use to remember the very few that must be remembered (hopefully one), 2. Combination of any method with bio-measurement (eg facial recognition, fingerprint recognition, iris recognition). How vulnerable is this if hashing is local to the device, 3. Apple’s new passkeys (sounds awfully like ssh to me).

josephfredbill
Автор

This video isn't going to age well. Check back here in 10 years when a 128 year password using 1000 GPUs can be cracked in 10 days by a simple laptop.

Tass...
Автор

What programming language will need to learn to do for security in data center? I’m interested in Kotlin, will it help?

MarioCheong-luhb
Автор

So you are telling me my 60 character random password is not going to get cracked so easily. I would have gone for a longer but the service had a character limit. Also since i didn't use a password generator or manager i store it in my primarily 256 bit encrypted server which could be a point of vulnerability, but if the hacker did so much work i would just give up.

Zac_Cole
Автор

This video was helpful, at least now I can crack my own passwords if I forget them... And if I can't, that means that I've chosen really good passwords...

ewellynn
Автор

You can't go wrong with _Password1_

ihateunicorns
Автор

The big disadvantage of two-factor identification is that you need an internet connection, which wouldn't work with an air gap system

sbcinema
Автор

What is the distro you used? I wanted to download it please 🌹

cluodalex
Автор

love the way how you organise and show things in videos, excellent

dipperskrrt
Автор

Sir, You cover the topics very well ❤ I have come to understand
When will the next video come sir?❤
Il

amansaiyed
Автор

Your videos made me a lot more privacy conscious 😅 thanks brother love from india 🇮🇳

surajpanditexe
Автор

Luckily I changed my password after your short to the one you use in the video. Because It's super secure.

Pretended
Автор

Thanks for an interesting video. I do hope you found the cause of the distortions that were left into it.

VulcanOnWheels
Автор

No mention of quantum computers in the video, quantum computers would shorten those years to hours and days.

Luckily there's no quantum computer yet

pandit-jee-bihar