{"id":632,"date":"2005-11-11T22:14:57","date_gmt":"2005-11-12T02:14:57","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/dbnews\/2005\/11\/11\/password-crackers-utilize-hash\/"},"modified":"2005-11-11T22:14:57","modified_gmt":"2005-11-12T02:14:57","slug":"password-crackers-utilize-hash","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/2005\/11\/11\/password-crackers-utilize-hash\/","title":{"rendered":"Password Crackers Utilize Hash"},"content":{"rendered":"<p><a name='a7328'><\/a><\/p>\n<table width=\"537\" border=\"0\">\n<tr>\n<td height=\"286\">\n<p align=\"justify\">  <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/cyber.law.harvard.edu\/blogs\/static\/dowbrigade\/ctv1.gif\" width=\"288\" height=\"144\" align=\"left\">A trio of entrepreneurial hackers hope<br \/>\n        to do for the business of password cracking what Google did for search<br \/>\n        and, in the process, may remove the last vestiges of security from many<br \/>\n        password systems.<\/p>\n<p>      Over the past two years, three security enthusiasts from the United States<br \/>\n      and Europe set a host of computers to the task of creating eleven enormous<br \/>\n      tables of data that can be used to look up common passwords. <\/p>\n<p align=\"justify\">The tables<br \/>\n        &#8211; totaling 500GB &#8211; form the core data of a technique known as rainbow<br \/>\n        cracking, which uses vast dictionaries of data to let anyone reverse<br \/>\n        the process<br \/>\n        of creating hashes &#8211; the statistically unique codes that, among other<br \/>\n        duties, are used to obfuscate a user&#8217;s password.Last week, the trio went<br \/>\n        public<br \/>\n        with their service. Called RainbowCrack Online, the site allows anyone<br \/>\n        to pay a subscription fee and submit password hashes for cracking.<\/p>\n<p align=\"justify\"><em>This is no different that making skeleton keys or<br \/>\n          selling kits that allow folks to pirate cable signals.&nbsp; People<br \/>\n          who care about or need secure systems will start using passwords that<br \/>\n          rainbow tables<br \/>\n        can&#8217;t crack.&nbsp;However, trying to pass themselves off as a legitimate<br \/>\n        business and selling cracks from their web site, lacking a number of<br \/>\n        legitimate customers, smacks us as about as smart as selling the other<br \/>\n        kind of crack.<\/em><\/p>\n<p align=\"justify\">from <a href=\"http:\/\/www.theregister.co.uk\/2005\/11\/10\/password_hashes\/\">the<br \/>\n          Register<\/a><\/p>\n<p align=\"justify\">&nbsp;<\/p>\n<\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>A trio of entrepreneurial hackers hope to do for the business of password cracking what Google did for search and, in the process, may remove the last vestiges of security from many password systems. Over the past two years, three &hellip; <a href=\"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/2005\/11\/11\/password-crackers-utilize-hash\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":299,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[576],"tags":[],"class_list":["post-632","post","type-post","status-publish","format-standard","hentry","category-wacky-news"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/posts\/632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/users\/299"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/comments?post=632"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/posts\/632\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/media?parent=632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/categories?post=632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/tags?post=632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}