SHARE
Facebook X Pinterest WhatsApp

Hashed Passwords Readily Cracked by Hackers

Dec 19, 2011

Cyber-attackers have a growing body of information and automated password cracking tools to breach systems and networks, Imperva said in a report. For example, they have have access to various tools to launch their campaigns, such as scanning Websites and applications for vulnerabilities, crafting malicious emails and launching drive-by-download Web portals.

Cyber-attackers have access to rainbow tables and dictionaries to aid them in cracking passwords, Imperva researchers wrote in their monthly Hacker Intelligence Initiative report released Dec. 14. Organizations have to beef up their password security practices to prevent attackers from successfully guessing passwords and getting access to the network, Imperva said.

Imperva analyzed a list of nearly 100,000 passwords that were exposed by a data breach at film enthusiast Website FilmRadar.com. The site had stored user passwords using the SHA1 hash function, which is a common method used to secure applications, but it wasn’t enough, according to Imperva. The strength of a cryptographic hash is irrelevant because attackers can bypass the protections and guess what the password is, Imperva found.

“Contrary to common belief, cryptographic hash functions in general–whether they are SHA-1 or any other cryptographic function–are not impervious to hackers,” Imperva researchers wrote in the report.

Password cracking tools that make use of rainbow tables and dictionaries are readily available, and most are free for anyone to download, Imperva said. Some popular cracking tools include MD5 decrypter, Cyberwar Zone, Cain and Able, and John the Ripper, according to the report. Many of the tools also rely on hacker forums as a way to request and get additional tables and dictionaries.

Rainbow tables contain hash values that have already been precomputed for a large number of alphanumeric text. Although creating these tables is generally a lengthy process, once created, they can be reused over and over again. If the attacker has a hashed value of a password for a specific service, all that needs to be done is to look up the hash in the table and find the corresponding alphanumeric string. Imperva found a hacker Website that makes a rainbow table with more than 50 billion hashed values available to the public.

Strong passwords–those with multiple character types, such as both lowercase and uppercase letters, numbers and special characters, as well as long ones–make it computationally difficult to look up the hash in the rainbow table. However, researchers have recently shown that harnessing the power of cloud, such as renting out computing resources from Amazon Elastic Compute Cloud (EC2) can reduce the time required.

Dictionaries are similar in that they list common passwords with a precalculated hash value. Dictionary-based attacks are effective because as people are still using simple and common passwords, such as “Hello123” and “abcd123.”

Imperva ran some of the publicly available tools against the FilmRadar passwords. The team managed to uncover 77 of the 100 most popular passwords in less than 10 minutes using rainbow tables hosted on an online service, according to the report. The 100 most common passwords on the list accounted for 10 percent of the list. Nearly 5 percent of all passwords were guessed in less than two days using dictionaries. Even though it was a slow process, hackers could figure out passwords using multiple dictionaries, Imperva said.

Imperva recommends that enterprises not rely on just cryptographic hashes, but to “salt” the entries to protect against rainbow table attacks. A salt value is a random value that is added to the beginning of the password before it gets encrypted, making it even harder to crack the password. A salt of just three-bit length increases the storage and precomputation time for rainbow tables eightfold, according to Imperva.

Enterprises should use passphrases, longer passwords that are easier to remember. Passphrases result in long passwords, but users don’t need to worry about writing them down on a Post-It. Password security should also be enforced, by comparing the password against the same dictionaries being used by attackers. Microsoft recently banned common passwords on its Hotmail Webmail service.

To read the original eWeek article, click here: Hashed Passwords Readily Cracked by Code Dictionaries, Rainbow Tables

Recommended for you...

Benefits of ERP: Weighing the Pros and Cons
Shelby Hiter
Apr 22, 2022
COVID-19 Effects on Digital Transformation: A Review of James P. Quinn’s Tech Trends 24/7
Shelby Hiter
Nov 10, 2021
CIO vs CISO: What are the 5 Big Differences?
Shelby Hiter
Oct 29, 2021
Edge Computing: Tips for Hiring and Getting Hired
Shelby Hiter
Aug 11, 2021
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.