<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Passwords on System Overlord</title><link>https://systemoverlord.com/tags/passwords.html</link><description>Recent content in Passwords on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Sat, 05 Jun 2021 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/passwords/index.xml" rel="self" type="application/rss+xml"/><item><title>GPU Accelerated Password Cracking in the Cloud: Speed and Cost-Effectiveness</title><link>https://systemoverlord.com/2021/06/05/gpu-accelerated-password-cracking-in-the-cloud.html</link><pubDate>Sat, 05 Jun 2021 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2021/06/05/gpu-accelerated-password-cracking-in-the-cloud.html</guid><description>&lt;p&gt;&lt;em&gt;Note: Though this testing was done on Google Cloud and I work at Google, this
work and blog post represent my personal work and do not represent the views of
my employer.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;As a red teamer and security researcher, I occasionally find the need to crack
some hashed passwords. It used to be that &lt;a href="https://www.openwall.com/john/"&gt;John the
Ripper&lt;/a&gt; was the go-to tool for the job. With
the advent of GPGPU technologies like CUDA and OpenCL,
&lt;a href="https://hashcat.net/hashcat/"&gt;hashcat&lt;/a&gt; quickly eclipsed John for pure speed.
Unfortunately, &lt;a href="https://www.bbc.com/news/technology-55755820"&gt;graphics cards are a bit hard to come by in
2021&lt;/a&gt;. I decided to take a look
at the options for running &lt;code&gt;hashcat&lt;/code&gt; on Google Cloud.&lt;/p&gt;</description></item><item><title>How the Twitter and GitHub Password Logging Issues Could Happen</title><link>https://systemoverlord.com/2018/05/03/how-the-twitter-and-github-password-logging-issues-could-happen.html</link><pubDate>Thu, 03 May 2018 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2018/05/03/how-the-twitter-and-github-password-logging-issues-could-happen.html</guid><description>&lt;p&gt;There have recently been a couple of highly-publicized (at least in the security
community) issues with two tech giants logging passwords in plaintext. First,
GitHub &lt;a href="https://www.zdnet.com/article/github-says-bug-exposed-account-passwords/"&gt;found they were logging plaintext passwords on password
reset&lt;/a&gt;.
Then, Twitter &lt;a href="https://twitter.com/TwitterSupport/status/992132808192634881"&gt;found they were logging all plaintext
passwords&lt;/a&gt;. Let
me begin by saying that I have no insider knowledge of either bug, and I have
never worked at either Twitter or GitHub, but I enjoy randomly speculating on
the internet, so I thought I would speculate on this. (Especially since the
&lt;a href="https://www.reddit.com/r/netsec/comments/8guet1/twitter_tells_all_330m_users_to_change_passwords/"&gt;/r/netsec thread on the Twitter article&lt;/a&gt; is amazingly full of misconceptions.)&lt;/p&gt;</description></item><item><title>What the LastPass CLI tells us about LastPass Design</title><link>https://systemoverlord.com/2015/09/16/what-the-lastpass-cli-tells-us-about-lastpass-design/</link><pubDate>Wed, 16 Sep 2015 05:58:19 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2015/09/16/what-the-lastpass-cli-tells-us-about-lastpass-design/</guid><description>&lt;p&gt;&lt;a href="https://lastpass.com/"&gt;LastPass&lt;/a&gt; is a password manager that claims not to be
able to access your data.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;All sensitive data is encrypted and decrypted locally before syncing with
LastPass. Your key never leaves your device, and is never shared with
LastPass. Your data stays accessible only to you.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;While it would be pretty hard to prove that claim, it is interesting to take
a look at how they implement their zero-knowledge encryption. The LastPass
browser extensions are a mess of minified JavaScript, but they&amp;rsquo;ve been kind
enough to publish an &lt;a href="https://github.com/lastpass/lastpass-cli"&gt;open-source command line
client&lt;/a&gt;, that&amp;rsquo;s quite readable C code.
I was interested to see what we could learn from the CLI, and while it won&amp;rsquo;t
prove that they can&amp;rsquo;t read your passwords, it will help to understand their
design.&lt;/p&gt;</description></item><item><title>Towards a Better Password Manager</title><link>https://systemoverlord.com/2014/10/31/towards-a-better-password-manager/</link><pubDate>Fri, 31 Oct 2014 01:16:10 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/10/31/towards-a-better-password-manager/</guid><description>&lt;p&gt;The consensus in the security community is that &lt;a href="http://www.wired.com/2014/08/passwords_microsoft/"&gt;passwords suck&lt;/a&gt;, but they&amp;rsquo;re here to stay, at least for a while longer. Given breaches like &lt;a href="http://krebsonsecurity.com/2013/10/adobe-breach-impacted-at-least-38-million-users/"&gt;Adobe&lt;/a&gt;, &amp;hellip;, it&amp;rsquo;s becoming more and more evident that the biggest threat is not weak passwords, but &lt;a href="https://xkcd.com/792/"&gt;password reuse&lt;/a&gt;. Of course, the solution to password to reuse is to use one password for every site that requires you to log in. The problem is that your average user has &lt;a href="http://www.dailymail.co.uk/sciencetech/article-2174274/No-wonder-hackers-easy-Most-26-different-online-accounts--passwords.html"&gt;dozens of online accounts&lt;/a&gt;, and they probably can&amp;rsquo;t remember those dozens of passwords. So, we build tools to help people remember passwords, mostly password managers, but do we build them well?&lt;/p&gt;</description></item></channel></rss>