Page 17 of 24 FirstFirst ... 714151617181920 ... LastLast
Results 401 to 425 of 595

Thread: The Linux Help and Tutorial Thread

  1. #401
    Crunching For The Points! NKrader's Avatar
    Join Date
    Dec 2005
    Location
    Renton WA, USA
    Posts
    2,891
    PCI
    Atheros - ath9k

    Its not being seen, ifconfig? Iwconfig? One of those doesn't show anything.

    Thus is kinda why I dislike Linux, there are tutorials everywhere, but I always run into something different and that makes tutorial useless.

  2. #402
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    does the card show up under Windows?

    I'll assume you are using this with a recent version of a Debian/Ubuntu distro....

  3. #403
    Crunching For The Points! NKrader's Avatar
    Join Date
    Dec 2005
    Location
    Renton WA, USA
    Posts
    2,891
    Quote Originally Posted by PoppaGeek View Post
    does the card show up under Windows?

    I'll assume you are using this with a recent version of a Debian/Ubuntu distro....
    yes works under windows,

    and about the distro..

    well its backtrack linux gnome/ubuntu build. so i realize thats whats most likely causing the "plug and play" issues as its not a new version of ubuntu.

    also if you help with any command things im logged as root so i thing no sudo commands nessisary?

  4. #404
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    ifconfig and iwconfig are going to talk to the driver. If the driver is not there or not loaded then nothing will show. You need to do a dmesg to see if it shows up. dmesg shows what hardware is detected. If it does you are going to need to instal the driver.

    root user does not need sudo.

    Maybe try Kali? Less calories and fat yet all the same nutrients.


    Are you trying this in a VM?
    Last edited by PoppaGeek; 12-08-2013 at 03:01 PM.

  5. #405
    Xtreme crazy bastid
    Join Date
    Apr 2007
    Location
    On mah murder-sickle!
    Posts
    5,878
    Best to leave Kali well alone. It's REALLY not something that's intended for even intermediate Linux users, comes with many toys that can get you on multiple government watch lists and won't run BOINC v 6.12.x on (I tried last night) due to unmeetable (GlibC versions to be specific, updating which is likely to break the whole system) dependencies. Also, the only account set up in Kali by default is root. Unless you set them up yourself there are no user accounts. It is HIGHLY inadvisable to browse the internet from the root account. It's also built on Debian, not Ubuntu, and a lot of things are not compatible thanks to Ubuntu screwing with things and trying to go their own way. If you want a distro that's flexible enough to do pretty much whatever with minimum hassle, use Mint. Kali is also REALLY awkward to get some hardware running properly due to it's odd package version mix. I spent three days trying to get the OpenCL drivers working on it only to find out there are compatibility issues between the drivers versions and the tool I wanted to use OpenCL for. The same driver version issue affects Windows machines, it's the tool that's super fickle.

    People assume that because a given piece of hardware runs in Windows it should run under Linux. That's a poor assumption. Mac hardware often doesn't run on Windows but do people blame Windows for that? No. They realise that someone somewhere has to write the drivers for that hardware and if a given OS is not their intended market then they won't be writing the drivers to suit. Most of the time Linux developers step up and make things work, but some hardware is just too obscure, poorly made, or even too expensive to be obtainable by people working for nothing (or within tight budgets) and so not worth the trouble. There are multiple lists of what hardware is supported by Linux and what drivers are required if people take the time to look for them. using incompatible hardware is the user's fault, not the operating system no matter if they're using Linux, Mac OS or Windows.
    Last edited by D_A; 12-08-2013 at 03:46 PM.

    [SIGPIC][/SIGPIC]

  6. #406
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    Well I did not know that Kali would not run Boinc but I also have no idea why anyone would want to use that combo anyway. To each his own.

    If a VM is involved I can almost assure you Linux is not the problem.

    What I am getting tired of is trying to drag info out of people. I gave up on WCG Forums when I can not get a guy to tell me what "FAAH crashed my computer" means. Blue screen? Lockup? Reboot? Shutdown?

    And yes Kali, Backtrack and even Debian can get a person in trouble, different sorts of trouble. It would be fair to say if you can't get a PCI WiFi card that has linux drivers working you should not be playing with pen test distros.

    You can try this but I won't help. Sorry. https://forums.kali.org/showthread.p...ros-Lan-Driver
    Last edited by PoppaGeek; 12-08-2013 at 04:51 PM.

  7. #407
    Xtreme Member
    Join Date
    Oct 2012
    Posts
    448
    Quote Originally Posted by NKrader View Post
    I love Linux, just spent 4 hours trying to get a wireless card working that is said to be "plug and play" "should automatically recognize it"

    Lol.. Nope, and I can't even figure out how to install a driver..

    I'm just spitballing, but wouldn't it be easier to just buy a longer Ethernet cord and go wired? Monoprice and Cables2Go have pretty cheap ones. And Newegg has them on sale at least once a week...
    Desktop rigs:
    Oysterhead- Intel i5-2320 CPU@3.0Ghz, Zalman 9500AT2, 8Gb Patriot 1333Mhz DDR3 RAM, 120Gb Kingston V200+ SSD, 1Tb Seagate HD, Linux Mint 17 Cinnamon 64 bit, LG 330W PSU

    Flying Frog Brigade-Intel Xeon W3520@2.66Ghz, 6Gb Hynix 1066Mhz DDR3 RAM, 640Gb Hitachi HD, 512Mb GDDR5 AMD HD4870, Mac OSX 10.6.8/Linux Mint 14 Cinnamon dual boot

    Laptop:
    Colonel Claypool-Intel T6600 Core 2 Duo, 4Gb 1066Mhz DDR3 RAM, 1Gb GDDR3 Nvidia 230M,240Gb Edge SATA6 SSD, Windows 7 Home 64 bit




  8. #408
    Crunching For The Points! NKrader's Avatar
    Join Date
    Dec 2005
    Location
    Renton WA, USA
    Posts
    2,891
    Quote Originally Posted by PoppaGeek View Post
    ifconfig and iwconfig are going to talk to the driver. If the driver is not there or not loaded then nothing will show. You need to do a dmesg to see if it shows up. dmesg shows what hardware is detected. If it does you are going to need to instal the driver.

    root user does not need sudo.

    Maybe try Kali? Less calories and fat yet all the same nutrients.


    Are you trying this in a VM?
    okay and no vm im running this on a spare drive and just swap drives when doing this.

    Quote Originally Posted by D_A View Post
    Best to leave Kali well alone. It's REALLY not something that's intended for even intermediate Linux users, comes with many toys that can get you on multiple government watch lists and won't run BOINC v 6.12.x on (I tried last night) due to unmeetable (GlibC versions to be specific, updating which is likely to break the whole system) dependencies. Also, the only account set up in Kali by default is root. Unless you set them up yourself there are no user accounts. It is HIGHLY inadvisable to browse the internet from the root account. It's also built on Debian, not Ubuntu, and a lot of things are not compatible thanks to Ubuntu screwing with things and trying to go their own way. If you want a distro that's flexible enough to do pretty much whatever with minimum hassle, use Mint. Kali is also REALLY awkward to get some hardware running properly due to it's odd package version mix. I spent three days trying to get the OpenCL drivers working on it only to find out there are compatibility issues between the drivers versions and the tool I wanted to use OpenCL for. The same driver version issue affects Windows machines, it's the tool that's super fickle.

    People assume that because a given piece of hardware runs in Windows it should run under Linux. That's a poor assumption. Mac hardware often doesn't run on Windows but do people blame Windows for that? No. They realise that someone somewhere has to write the drivers for that hardware and if a given OS is not their intended market then they won't be writing the drivers to suit. Most of the time Linux developers step up and make things work, but some hardware is just too obscure, poorly made, or even too expensive to be obtainable by people working for nothing (or within tight budgets) and so not worth the trouble. There are multiple lists of what hardware is supported by Linux and what drivers are required if people take the time to look for them. using incompatible hardware is the user's fault, not the operating system no matter if they're using Linux, Mac OS or Windows.
    the toys that get you into trouble are mostly why im playing with this os. and im not looking to run boinc on it. im not really doing much but I hear about how easy it is to break into wireless and such some im gonna test securities of my network and a spare one that i have setup just for this, just bored and want to play around.

    Quote Originally Posted by PoppaGeek View Post
    Well I did not know that Kali would not run Boinc but I also have no idea why anyone would want to use that combo anyway. To each his own.

    If a VM is involved I can almost assure you Linux is not the problem.

    What I am getting tired of is trying to drag info out of people. I gave up on WCG Forums when I can not get a guy to tell me what "FAAH crashed my computer" means. Blue screen? Lockup? Reboot? Shutdown?

    And yes Kali, Backtrack and even Debian can get a person in trouble, different sorts of trouble. It would be fair to say if you can't get a PCI WiFi card that has linux drivers working you should not be playing with pen test distros.

    You can try this but I won't help. Sorry. https://forums.kali.org/showthread.p...ros-Lan-Driver
    yes i realize that when running a vm you MUST use usb wireless nic becuase of the rights access such. its not that.

    Quote Originally Posted by yojimbo197 View Post
    I'm just spitballing, but wouldn't it be easier to just buy a longer Ethernet cord and go wired? Monoprice and Cables2Go have pretty cheap ones. And Newegg has them on sale at least once a week...
    i want to the nic to work so i can play with the goodies included in this os. also eventually when i go to install ubuntu i will need it wireless as i want to have two of these in random places in my house and I only have 1 router and its in my bedroom.






    looks like im just gona buy a wireless usb nic that works out of the box with this, its only 25$ and its truly plug and play.
    Last edited by NKrader; 12-08-2013 at 05:08 PM.

  9. #409
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    I use the Alfa AWUS036H on Mint and Kali with no problems. It is $39 though.

    This one is $9.99 and works on my Raspberry Pi, Debian based Raspbian. And Mint and Kali.
    Last edited by PoppaGeek; 12-08-2013 at 06:08 PM.

  10. #410
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    Here's a little something for the Windows users. Especially the ones who think they do not have any maleware or viruses and surf to p0rn sites, hacker/warez sites or download from torrents.

    Microsoft Network Monitor.

    Run it on the network interface of your Windows machine, use the on with an IP number. You will probably be flooded with a lot "stuff" and have no idea what most of it is. Just look at network IPs. Unfortunately I have yet to find a way to get it to resolve the IPs. You can use a web site like whatismyip.com to see who is registered to that ip and it's location. If it says Russia or China you might want to see what app is using that IP. If it says Microsoft or Google it is probably OK depending on your feelings about it. There are a lot on mine that do not say google but lead to google or a marketing firm of one sort or another.

    You can let it run for awhile and save the "capture" then open and read the saved capture. The longer it runs the bigger the file but the more accurate as it needs to catch the apps communicating with the mothership.

    You are concerned with your machines IP# being in either the source or destination columns. The app using that conection is in a third column. Ones that have no app listed and ones where you do not recognise the app name are the ones to focus on. There will be a lot of DNS and ARP stuff with no app listed, the Source and Destination should be your local network and or the DNS server.

    If you have concerns and want a good capture use the settings to limit capture file size and let it run all night and all day if you can. There is also the ability to create filers.

    Linux and Windows users can use Wireshark.

    sudo apt-get install wireshark

    Good luck. Hope you do not find anything too disturbing.
    Last edited by PoppaGeek; 12-08-2013 at 07:53 PM.

  11. #411
    Crunching For The Points! NKrader's Avatar
    Join Date
    Dec 2005
    Location
    Renton WA, USA
    Posts
    2,891
    Quote Originally Posted by PoppaGeek View Post
    Here's a little something for the Windows users. Especially the ones who think they do not have any maleware or viruses and surf to p0rn sites, hacker/warez sites or download from torrents.

    Microsoft Network Monitor.

    Run it on the network interface of your Windows machine, use the on with an IP number. You will probably be flooded with a lot "stuff" and have no idea what most of it is. Just look at network IPs. Unfortunately I have yet to find a way to get it to resolve the IPs. You can use a web site like whatismyip.com to see who is registered to that ip and it's location. If it says Russia or China you might want to see what app is using that IP. If it says Microsoft or Google it is probably OK depending on your feelings about it. There are a lot on mine that do not say google but lead to google or a marketing firm of one sort or another.

    You can let it run for awhile and save the "capture" then open and read the saved capture. The longer it runs the bigger the file but the more accurate as it needs to catch the apps communicating with the mothership.

    You are concerned with your machines IP# being in either the source or destination columns. The app using that conection is in a third column. Ones that have no app listed and ones where you do not recognise the app name are the ones to focus on. There will be a lot of DNS and ARP stuff with no app listed, the Source and Destination should be your local network and or the DNS server.

    If you have concerns and want a good capture use the settings to limit capture file size and let it run all night and all day if you can. There is also the ability to create filers.

    Linux and Windows users can use Wireshark.

    sudo apt-get install wireshark

    Good luck. Hope you do not find anything too disturbing.
    Why would I if anyone anywhere was looking at what I'm dong? If they really want to see me looking at :banana::banana::banana::banana: and checking my Facebook be my guest.

    Not like I'm working on top secret government work or anything

  12. #412
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    You missed the point completely.

    Malware and viruses are installed by visiting the sites mentioned. The malware can be keyloggers to capture and send to their mothership your banking username and password or your credit card info you used at a web site. Or maybe they install a drone that when commanded does a DDOS attack against a company they disapprove of or they are blackmailing.

    I forget not everyone reads security and network articles and keeps up with what goes on in the dark net. I suppose some do not even know what the dark net is.

    Maybe wrong audience for this stuff I guess.
    Last edited by PoppaGeek; 12-09-2013 at 04:46 AM.

  13. #413
    Xtreme X.I.P.
    Join Date
    Jan 2008
    Posts
    727
    Malware and viruses are installed by visiting the sites mentioned. The malware can be keyloggers to capture and send to their mothership your banking username and password or your credit card info you used at a web site. Or maybe they install a drone that when commanded does a DDOS attack against a company they disapprove of or they are blackmailing.
    Thanks for the info, PG...


  14. #414
    Xtreme crazy bastid
    Join Date
    Apr 2007
    Location
    On mah murder-sickle!
    Posts
    5,878
    Quote Originally Posted by PoppaGeek View Post

    I forget not everyone reads security and network articles and keeps up with what goes on in the dark net. I suppose some do not even know what the dark net is.
    That really depends on who you're talking to. The "dark net" is data that is connected, but cannot be found by public search engines. An example is data hidden behind company extranet search pages. Google, yahoo etc can't touch it, you have to go in through the company internal search engine. Some has enormous amounts of data available if you know what search terms to use. Companies have gotten better at making private information inaccessible to the public, but not everyone takes their security responsibilities seriously enough.
    The "warez" community like to think of themselves as the "dark net", but they're misappropriating the term (probably because it sounds ominous) just like the media bastardized the term "hacker" (really just someone who deeply understands stuff and makes it do novel things it wasn't designed to do) in the 80s.

    [SIGPIC][/SIGPIC]

  15. #415
    Xtreme crazy bastid
    Join Date
    Apr 2007
    Location
    On mah murder-sickle!
    Posts
    5,878
    Quote Originally Posted by NKrader View Post
    Why would I if anyone anywhere was looking at what I'm dong? If they really want to see me looking at :banana::banana::banana::banana: and checking my Facebook be my guest.

    Not like I'm working on top secret government work or anything
    Most systems are not compromised to attack the owner, they are compromised for use in further large scale operations such as DDOS attacks or spam forwarding ... that includes governments. Making YOUR machine be the one that is probing a Chinese Government server gives the real culprits plausible deniability but opens you up to reprisals.
    As for government surveillance, never forget that information can be misinterpreted to suit their ends at will. Accidentally passed by a kiddie :banana::banana::banana::banana: site but left immediately? They hit you for having those images stored on your system, for example. Just because you haven't done anything wrong doesn't mean the evidence can't be made to look like you have.

    [SIGPIC][/SIGPIC]

  16. #416
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    Quote Originally Posted by D_A View Post
    That really depends on who you're talking to. The "dark net" is data that is connected, but cannot be found by public search engines. An example is data hidden behind company extranet search pages. Google, yahoo etc can't touch it, you have to go in through the company internal search engine. Some has enormous amounts of data available if you know what search terms to use. Companies have gotten better at making private information inaccessible to the public, but not everyone takes their security responsibilities seriously enough.
    The "warez" community like to think of themselves as the "dark net", but they're misappropriating the term (probably because it sounds ominous) just like the media bastardized the term "hacker" (really just someone who deeply understands stuff and makes it do novel things it wasn't designed to do) in the 80s.
    There is a third dark net.


    @jeanguy2 you are welcome. I was hoping someone would find it helpful.
    Last edited by PoppaGeek; 12-09-2013 at 12:27 PM.

  17. #417
    Xtreme crazy bastid
    Join Date
    Apr 2007
    Location
    On mah murder-sickle!
    Posts
    5,878
    I would still argue, "not really". There are sites that can only be accessed if you know the IP address, much like it was in the early days of the internet. It's the same concept though, stuff that's not available via public search engines.

    Gophernet (gttp protocol from memory) died a while back btw.

    [SIGPIC][/SIGPIC]

  18. #418
    Crunching For The Points! NKrader's Avatar
    Join Date
    Dec 2005
    Location
    Renton WA, USA
    Posts
    2,891
    Quote Originally Posted by D_A View Post
    Most systems are not compromised to attack the owner, they are compromised for use in further large scale operations such as DDOS attacks or spam forwarding ... that includes governments. Making YOUR machine be the one that is probing a Chinese Government server gives the real culprits plausible deniability but opens you up to reprisals.
    As for government surveillance, never forget that information can be misinterpreted to suit their ends at will. Accidentally passed by a kiddie :banana::banana::banana::banana: site but left immediately? They hit you for having those images stored on your system, for example. Just because you haven't done anything wrong doesn't mean the evidence can't be made to look like you have.
    that would be tough considering I dont have a computer plugged into an internet connection. other than about 5min a day to upload completed WU, and I strictly watch whats being done as I am about to hit overages on my mobile bandwith

    its true, but get your point, im just trolololololin lol.


    and if events of late dont prove it enough i will restate, if the government wants to look at what your doing they will regardless of how "secure" your system is, when they can look at all traffic in and out of your house it doesnt matter if you saved it when they do.

    there is no such thing as privacy now adays, get used to it and embrace it, there is nothing we as general population can do, especially looking at how other governments cant do anything to stop our gov from looking at them what kind can we do about it? answer is, nothing at all, get used to it
    Last edited by NKrader; 12-09-2013 at 12:41 PM.

  19. #419
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    Quote Originally Posted by D_A View Post
    I would still argue, "not really". There are sites that can only be accessed if you know the IP address, much like it was in the early days of the internet. It's the same concept though, stuff that's not available via public search engines.

    Gophernet (gttp protocol from memory) died a while back btw.
    And I won't. Like I said not everyone knows about it and dark net might well have been misappropriated but I was not looking for a semantics debate. Sorry I mentioned it, not sure why I did anyway.

    @nkrader My mention of network monitoring was not directed at you personally. I was poking around in it and Wireshark and thought I would mention in the thread how useful it can be to see what is going on on your network.
    Last edited by PoppaGeek; 12-09-2013 at 12:37 PM.

  20. #420
    Xtreme crazy bastid
    Join Date
    Apr 2007
    Location
    On mah murder-sickle!
    Posts
    5,878
    If you were a genuine target, that's not a real barrier.

    [SIGPIC][/SIGPIC]

  21. #421
    Crunching For The Points! NKrader's Avatar
    Join Date
    Dec 2005
    Location
    Renton WA, USA
    Posts
    2,891
    Quote Originally Posted by PoppaGeek View Post
    And I won't. Like I said not everyone knows about it and dark net might well have been misappropriated but I was not looking for a semantics debate. Sorry I mentioned it, not sure why I did anyway.

    @nkrader My mention of network monitoring was not directed at you personally. I was poking around in it and Wireshark and thought I would mention in the thread how useful it can be to see what is going on on your network.
    fair enough im just talkin lol. i do this too much

  22. #422
    Xtreme crazy bastid
    Join Date
    Apr 2007
    Location
    On mah murder-sickle!
    Posts
    5,878
    PG is quite right. There's a lot more going on than meets the eye, and most people are well advised to leave well enough alone. This is "deep end of the pool" stuff.

    [SIGPIC][/SIGPIC]

  23. #423
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    [QUOTE=NKrader;5219582]that would be tough considering I dont have a computer plugged into an internet connection. other than about 5min a day to upload completed WU, and I strictly watch whats being done as I am about to hit overages on my mobile bandwith

    its true, but get your point, im just trolololololin lol.


    and if events of late dont prove it enough i will restate, if the government wants to look at what your doing they will regardless of how "secure" your system is, when they can look at all traffic in and out of your house it doesnt matter if you saved it when they do.

    there is no such thing as privacy now adays, get used to it and embrace it, there is nothing we as general population can do, especially looking at how other governments cant do anything to stop our gov from looking at them what kind can we do about it? answer is, nothing at all, get used to it[/QUOTE]

    I thought of your statement while reading this. Scary sh1t.

    New US spy satellite features world-devouring octopus



    Some fo the reader comments are funny.

  24. #424
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    Quote Originally Posted by NKrader View Post
    okay and no vm im running this on a spare drive and just swap drives when doing this.



    the toys that get you into trouble are mostly why im playing with this os. and im not looking to run boinc on it. im not really doing much but I hear about how easy it is to break into wireless and such some im gonna test securities of my network and a spare one that i have setup just for this, just bored and want to play around.



    yes i realize that when running a vm you MUST use usb wireless nic becuase of the rights access such. its not that.



    i want to the nic to work so i can play with the goodies included in this os. also eventually when i go to install ubuntu i will need it wireless as i want to have two of these in random places in my house and I only have 1 router and its in my bedroom.

    looks like im just gona buy a wireless usb nic that works out of the box with this, its only 25$ and its truly plug and play.
    If you are bored and want to learn by all means go for it.

    But if you just want to know your WiFi is secure I can save you some time. Use WPA/WPA2 and a password 16 random characters long using lower and uppercase, numbers and special characters. abcd1234 takes my 1.6gz laptop 2 and half seconds to crack from a WPA dump. 54ae6B#4aD@cJJp2 will take 6 high end AMD GPUs several weeks at worst a week at best. 12 digits is probably enough but at 16 anyone willing to do what it takes to crack that password is going to get in no matter what you do.

    I am looking for the article I got the info from and will update my numbers if they are off.

    Well I can't find original article, it was on Ars Technica. But I found a spread sheet at a security blog with some numbers.

    16 lowercase, uppercase, numbers and symbols in random pattern, no dictionary words, takes a max of 45,302,633,348,959 days to crack assuming 400,000,000,000 keyrate per seconds. Average number of days is about half that. A AMD 6990 can roughly do 9 billion a second. Anyway my point is use 12-16 character passwords using random characters, numbers and symbols and forget it.

    The numbers can vary depending on hardware, crack program and method but it is agreed that at 12 characters you really want the password and at 16 you'll go elsewhere until technology improves some more.



    25-GPU cluster cracks every standard Windows password in <6 hours
    Last edited by PoppaGeek; 12-10-2013 at 09:21 AM.

  25. #425
    Crunching For The Points! NKrader's Avatar
    Join Date
    Dec 2005
    Location
    Renton WA, USA
    Posts
    2,891
    Quote Originally Posted by PoppaGeek View Post
    If you are bored and want to learn by all means go for it.

    But if you just want to know your WiFi is secure I can save you some time. Use WPA/WPA2 and a password 16 random characters long using lower and uppercase, numbers and special characters. abcd1234 takes my 1.6gz laptop 2 and half seconds to crack from a WPA dump. 54ae6B#4aD@cJJp2 will take 6 high end AMD GPUs several weeks at worst a week at best. 12 digits is probably enough but at 16 anyone willing to do what it takes to crack that password is going to get in no matter what you do.

    I am looking for the article I got the info from and will update my numbers if they are off.

    Well I can't find original article, it was on Ars Technica. But I found a spread sheet at a security blog with some numbers.

    16 lowercase, uppercase, numbers and symbols in random pattern, no dictionary words, takes a max of 45,302,633,348,959 days to crack assuming 400,000,000,000 keyrate per seconds. Average number of days is about half that. A AMD 6990 can roughly do 9 billion a second. Anyway my point is use 12-16 character passwords using random characters, numbers and symbols and forget it.

    The numbers can vary depending on hardware, crack program and method but it is agreed that at 12 characters you really want the password and at 16 you'll go elsewhere until technology improves some more.



    25-GPU cluster cracks every standard Windows password in <6 hours
    mine is already wpa2 and i use random generator with 16+ characters, just mostly playing around wanting to do some stuff thats mildly fun lol.

    thanks

    dispite being kinda old, still good read, thanks!
    Last edited by NKrader; 12-10-2013 at 09:54 AM.

Page 17 of 24 FirstFirst ... 714151617181920 ... LastLast

Bookmarks

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •