Skip to main content

Posts

Showing posts from October, 2021

Brute Force Password Hacking: How long will it take to Brute Force a password

As we all know, its not a good idea to brute force a password, as its much faster to use password attacks using hashcat. I found a good graphic on how slow brute force hacking can be, depending on the length and the complexity of the password.  The graph also demonstrates how longer passwords offer, and alphanumeric complexity, can alter the risk vector in your favor. The game of password hacking is this: Users reset password every month, ie 30 days If we can Brute force the password in 10 days, we can use the password for another 20 days. Brute force attacks, will normally crack the password about half way through the times quote. An 8 character password, is listed as 84 days, which means it should crack in approximately 41 days (close to a months reset).  How would you protect accounts at this point?  It is recommended to force longer passwords, eg 10-14 characters to protect against brute force attacks, as a pragmatic, rather than guaranteed security. Its possible that a brute force

Linux Structure

  Linux Structure History Linux, computer operating system created in the early 1990s by Finnish software engineer Linus Torvalds and the Free Software Foundation (FSF). While still a student at the University of Helsinki, Torvalds started developing Linux to create a system similar to MINIX, a UNIX operating system. Over the years, the Linux kernel has gone from a small number of files written in C under licensing that prohibited commercial distribution to the latest version with over 23 million source code lines (comments excluded), licensed under the GNU General Public License v2. Linux is available in over 600 distributions (or an operating system based on the Linux kernel and supporting software and libraries). Some of the most popular and well-known being Ubuntu, Debian, Fedora, OpenSUSE, elementary, Manjaro, Gentoo Linux, RedHat, and Linux Mint. Linux is generally considered more secure than other operating systems, and while it has had many kernel vulnerabilities in the past, i