Page 3 of 3 FirstFirst 123
Results 21 to 23 of 23

Thread: DIY Spy drone cracks Wi-Fi networks and cell data

  1. #21
    Orca Whisperer n2ize's Avatar
    Join Date
    Dec 2007
    Location
    Crestwood, New York
    Posts
    33,899
    Quote Originally Posted by KC2UGV View Post
    Depends on the rainbow table. There are some out there that are a couple of gigs in size, with precomputed hashes for everything from A to AAAAAAAAAAAAAAAAAAAA
    On average how fast can they blaze through one of those really huge lists to crack a very random passphrase ?

    I guess if you have something you really need to keep secure use pencil and paper and keep it under lock and key.
    I keep my 2 feet on the ground, and my head in the twilight zone.

  2. #22
    Orca Whisperer
    Join Date
    Oct 2009
    Location
    Buffalo, NY
    Posts
    22,593
    Quote Originally Posted by n2ize View Post
    On average how fast can they blaze through one of those really huge lists to crack a very random passphrase ?

    I guess if you have something you really need to keep secure use pencil and paper and keep it under lock and key.
    To get through a 128-bit key, average of 10 minutes.

    If you need a wireless network to be secure, use RADIUS :)
    Big Giant Meteor 2020 - We need to make Earth Great Again

    http://www.coreyreichle.com

  3. #23
    Orca Whisperer n2ize's Avatar
    Join Date
    Dec 2007
    Location
    Crestwood, New York
    Posts
    33,899
    Quote Originally Posted by KC2UGV View Post
    To get through a 128-bit key, average of 10 minutes.

    If you need a wireless network to be secure, use RADIUS :)
    Okay, I was getting very confused because I was thinking in terms of cracking (by brute force) the entire 128 bit key space (which would be monumental and require enormous storage) and not thinking of the hash functions and the fact that they are non-injective mappings.. Combined with the enormous size (cardinality) of the pure 128 bit key space i.e. 2^128 is quite significant...(i.e. collisions). Much shorter to use a set of possible hashes based on a given character set, i.e. the typical keyboard.

    I'll take a look at RADIUS. I like to try and keep it secure.
    Last edited by n2ize; 08-13-2011 at 03:48 AM.
    I keep my 2 feet on the ground, and my head in the twilight zone.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •