Ever Wondered How Hackers Easily Crack Your Strongest Passwords?

password cracking explained

A common question that is often discussed in the cyber world of security is the storage of passwords and its encryption. Most of the time, when people talk about encrypted passwords they are talking about hashed passwords. Such a password that has undergone a hashing process can not be reversed using the same key, unlike encryption.

Sadly, all thanks but no thanks to the dozens of leaked password hashes on file-sharing websites and the dark web, users’ passwords are less secure than ever. A few of the most recent data breaches affected millions of TalkTalk and LinkedIn users.

We imagine gaining access to these password hashes, extracting correct passwords and using them to compromise online accounts is nothing close to a herculean task to hackers. These hackers are now targeting the social media accounts of technology CEOs–Mark Zuckerberg, Jack Dorsey, Marissa Mayer–and Hollywood celebrities via the same technique at an increasing rate.

Apparently, your super strong password is not completely safe from some advanced techniques as these massive breaches have made them unsafe and the process has been explained beautifully well in the YouTube channel Computerphile.

The video shows a deep learning beast that uses 4 NVIDIA GPUs and a password cracking tool called Hashcat which allows a user perform different types of password cracking techniques. Thanks to these GPUs, Hashcat can take billions of plain-text passwords and hash them using MD5 at a 40 billion per second rate. It is never a bad practice to avoid small combinations and dictionary words in your password and also to change passwords from time-to-time.

We hope you found this article helpful, don’t forget to let us know what’s on your mind in the comments section below.

About The Author
Martins Okoi
Computer Science enthusiasts with a passion for learning new things. In my spare time, I listen to music, read like a compiler, and learn like an A.I algorithm.

Leave a Response