• Home
  • The Song
  • The Avatar
  • The Cat
  • Contact the Cat

Gyp the Cat dot Com

How Secure is Your Password? Rainbow Tables Online
Uncategorized

How Secure is Your Password? Rainbow Tables Online

Wow, just wow, came across http://xdecrypt.com/ the other day, it’s a huge online resource full of hash values and their corresponding plain text strings.

Like most people, I am human and don’t have a limitless brain for remembering secure and one off passwords, so I tend to recycle about a dozen.  Dependant on how damaging access to the site would be depends on what password I use.  Also I don’t like pointing accounts to other accounts (ie registering on forums with the same password as the mail account etc) just common sense I guess.  My passwords are on a sliding scale of complexity, sometimes I’ll apply a unique salt myself, but not always.

Any way I digress.  Interesting website I thought, lets see how good it is.

I have a C# program on a virtual machine which converts strings to hash values (did it for a separate project a few years ago, I must get around to posting something about it was quite interesting, all to do with salf values and the like).

So I started this program up and generated a few hash values for passwords I know are quite common (ie ‘password’, ‘qwerty’, ‘password123’ and the like).  Copied and pasted onto http://xdecrypt.com/, and unsurprisingly it got them all.

Ok I thought, lets toughen it up a bit.  So I converted my lower security passwords into MD5 hashes.  Half of them with their corresponding plain texts came up.  Was a little surprised but not massively, saying these passwords are not found in a dictionary and are not combined words.

So the next level up with my medium passwords, didn’t get any of them thank goodness!

I dare say though it will just be a matter of time…

Which lead me on to two little comments.

Firstly if you have a database online with passwords in it, please apply a salt value.  It’s not hard, and will make someone getting a hold of your user table with all their hashed passwords quite a bit more difficult to go and hijack their Facebook account if that person uses the same passwords.

Second, Google have started uses two or even three factor authentication, Facebook does something even more interesting (if you log on from a different country it will get you to identify your friends via pictures very clever).  So my point is can we make multiple factor authentication easier to implement please.

Third, and most importantly as webmasters and IT Professionals please lets hash our password tables!

Related

Written by gyp - August 3, 2011 - 5232 Views
Tags | cryptography, internet, xdecrypt.com

You Might Also Like

Bonding Interfaces on Ubuntu 12.04LTS

March 12, 2014
Uber Vault

How to Install a SSL Certificate on Nginx

July 15, 2012

Microsoft Exchange 2007 550 5.7.1 Unable to Relay on Additional New Domain

February 22, 2011

6 Comments

  • What is xdecrypt.com? | Gyp the Cat dot Com September 16, 2011 at 12:16 pm

    […] by gyp on September 16, 2011 in internet with No comments Tweet I’ve noticed that my page about xdecrypt.com has picked up quite a lot of traffic with people asking the same question, so I’ve decided to […]

    Reply
  • Gyp the Cat dot Com First BirthdayGyp the Cat dot Com September 30, 2011 at 2:59 pm

    […] recent post that is gaining popularity is describing what xdecrypt.com is.  For quite a new article it really is making it into the top ten very quickly.  I put that down […]

    Reply
  • Jude November 15, 2011 at 6:27 pm

    Hey, my name came up on this, what does this all mean? What exactly do the numbers on the left mean, am I at risk by this?

    Reply
    • gyp November 15, 2011 at 10:07 pm

      Hi Jude,

      In a nutshell Xdecrypt use a program that searches the web for words and then converts them into a mathematical representation that is unique for that word. This is process is called a ‘hash’.

      The numbers on the left represent what your name is with this mathematical representation on the same line.

      My own belief on this one is that no you are not at risk if your name is listed on the site. If your password was on there I would be slightly more worried, but not necessarily a huge amount.

      There’s a big pile of questions in the comments section on the bottom of the what xdecrypt is, and many people have asked the same question as you 🙂

      There is also a new part on the xdecrypt site itself explaining how they go about getting their words in which to convert into the hashs.

      If I can be any further help please don’t hesitate to ask 🙂

      Gyp

      Reply
  • Tiffany March 31, 2012 at 12:52 am

    How do you apply a salt value to a password?? I googled this but I don’t understand. What is it and how do I do it? Thanks!

    Reply
    • gyp March 31, 2012 at 7:34 am

      This isn’t something that you as a user would usually worry about, it’s more the guys who develop software.

      However saying that you can quite easily salt your own passwords 🙂 For instance if you want to use the password “Password1” on say the website “companya.com”, you could make your password “companya.com.Password1”. As long as your password is hashed and not saved in plain text it should make it a lot more secure for you.

      Hope this answers your question, if you need any more help I will try as best I can.

      Gyp

      Reply

    Please Post Your Comments & Reviews
    Cancel reply

    Your email address will not be published. Required fields are marked *

    Previous Post
    Next Post

    Latest Posts

    • How to Convert CSV to Parquet Easily with Python on Linux Shell
    • Kusto Geolocation IP Lookup
    • Monitoring Tor Usage in Azure Sentinel, ASC, MDATP and ALA
    • HTTP to HTTPS Redirect on Azure CDN
    • Strongswan IPSec (Including Cryptomap) to Microsoft Azure Virtual Network Gateway
    • Black Ops 3 NAT Type Strict & PS4 NAT Type 3 with pfSense Fixed!
    • Sorry for the lack of posts
    • How to Block Internet Access with Group Policy (GPO)
    • Enforcing Microsoft Office 365 and Azure Tennancy with McAfee Web Gateway (MWG)
    • Scanning Subnet for Issuing Certificate Authority with OpenSSL

    Top Posts & Pages

    • How to Block Internet Access with Group Policy (GPO)
      How to Block Internet Access with Group Policy (GPO)
    • How to Configure Windows 2012 NPS for Radius Authentication with Ubiquiti Unifi
      How to Configure Windows 2012 NPS for Radius Authentication with Ubiquiti Unifi
    • Kusto Geolocation IP Lookup
      Kusto Geolocation IP Lookup
    • Tinyproxy A Quick and Easy Proxy Server on Ubuntu
      Tinyproxy A Quick and Easy Proxy Server on Ubuntu
    • Monitoring Tor Usage in Azure Sentinel, ASC, MDATP and ALA
      Monitoring Tor Usage in Azure Sentinel, ASC, MDATP and ALA
    • How to DNSPerf on Ubuntu 14.04 with Installation and Quick Start
      How to DNSPerf on Ubuntu 14.04 with Installation and Quick Start
    • How to Add Different Disclaimers using alterMIME and Postfix based on Domain
      How to Add Different Disclaimers using alterMIME and Postfix based on Domain
    • Blocking Countries on Nginx without the GeoIP Module
      Blocking Countries on Nginx without the GeoIP Module
    • How to Enable Squid Anonymous Stealth Mode
      How to Enable Squid Anonymous Stealth Mode
    • Configuring Suite B, VPN-A and VPN-B in IPSec with Strongswan
      Configuring Suite B, VPN-A and VPN-B in IPSec with Strongswan

    Tags

    apache2 azure azure log analytics blops business centos cheating cissp cloudflare cryptography dns game google gyp internet iphone ipsec isc linux mac marketing microsoft mw2 mx mysql nginx pfsense postfix proxy ps3 qualification radius revision security seo smtp socks squid ssh strongswan tinyproxy ubuntu windows 2012 wordpress xdecrypt.com
    Gyp the Cat dot Com

    Some rights retained Gyp the Cat Dot Com