Skip to main content
  1. Life
  2. Family & Parenting
  3. Child Safety

Do we Trust The Drunk or Flying Monkeys? (Video)

See also

September 23, 2013

Monkeys like humans kick back and have a beverage –much like average hackers and attackers just looking for a quick buck and usually quick scheme. Higher educated monkeys again much like their human counterparts search for challenges and look for easy access (such as passwords) and drill their way into an unsuspecting human computers and wreak havoc.

Passwords are the most typical means of authentication on your home network or work networks. An everyday employee may use multiple passwords every day in order to use all applications and systems provided by the Calgary employer. Calgary Businesses spend significant amounts of resources to deploy authentication mechanisms and policies, which are then compromised due to password leaks or misuse.

Attackers, however, have automated software that can calculate middle-of-the-road passwords with great ease. The misconception that longer and harder passwords can withstand the most state-of-the-art recovery techniques used by the majority hackers and attackers is untrue. Hackers and Attackers, like monkeys, look for the easiest way in and passwords and pass phrases that are re-used in different forms can be predicted and easily broke into.

There are two major categories of password attacks: online and offline.

Online password attacks are where a live host is brute-force and pools of possible passwords are used as input against a login form or session until successful login is achieved. This type of attack is usually easier to block by adding protection mechanisms such as Captcha images and a maximum limit on unsuccessful authentication attempts.

Offline password attacks, on the other hand, assume that the attacker already owns a database dump of passwords in hashed format and wishes to recover most them. The attacker can acquire hashed passwords from previous attacks, using SQL injections to get hashed passwords or database contents as commonly happens at the present time. The attackers aim is not so much to crack specific passwords, but rather to crack a significant proportion of the total database with the prospect that at least a significant number of them will allow the hackers access to items of value.

Types of attack techniques: An attacker/s will usually choose a password cracking technique that is known to be most efficient with the type of hashed password or passwords they are trying to recover. Effectiveness is usually measured by the time needed to complete an attack, the amount of resources the attack requires, and the success rate of the specific attack within the time space and with the resources used.

The password cracking toolbox: Brute-force attacks perform an exhaustive search using all possible series combinations for a specific password length. Brute-force attacks are known to be considered to be inefficient because it takes an unreasonable amount of time to perform a complete (lowercase, uppercase, numbers and special characters) attack for password lengths above about 10 characters.

Dictionary attacks are enhanced searches based on popular and commonly used passwords, which are compiled into a dictionary (or word list) and used against a password hash.

These days, new dictionaries are created and made public on a regular basis. This makes dictionary attacks more attractive and effective for an attacker.

The proof-of-concept attacks: Search engine exploitation (Instance: Google hash search). Handfuls of passwords can be recovered this way because of the innumerable lists of recovered passwords that have been already made public online. Combined dictionary attacks where several dictionaries are combined with each other and with themselves to create new dictionaries with larger and more complicated words and phrases.

Hybrid dictionary attacks are achieved by concatenating dictionaries with a brute-forced string or series attached to every dictionary entry. Rule-based dictionary attacks use a set of predefined rules to mutate an existing dictionary and expand it.

Markov chains are mathematical tools that have been initiated to password fissuring very recently. They work only with user-selected passwords and they create a collection of so-called words made of the most used syllables in a large sample of real-life passwords. These have recently been put to the test with great success against user passwords that contain “user-created” words or “mnemonics”.

Which Monkey will Evade The Password Madness?

Passwords do not provide adequate security for most systems. Multiple people and academia try to educate users to craft human mnemonic passwords and ways to improve the complexity of their passwords by simple mutation. Other suggestions include making passwords larger, adding numbers and special characters. We saw that these actions do not necessarily provide any additional security if they are part of a “common” practice.

Password or phrase is at least eight characters long

Does not contain: your user name, real names in the family, children’s names, dog or cat names

Does not contain: a complete dictionary word such as Monkeys or Bananas

Significantly different from previous passwords: Passwords that increment (Monkeys1, Monkeys2, Monkeys3 ...) are not strong.

Password or phrase contains characters from each of the following four groups: Symbols found on the keyboard (all keyboard characters not defined as letters or numerals)!@#. Uppercase letters, Lower case letters and numerals.

A stronger password may possibly look like: M0nk3>z@

Advertisement

Life

  • Banana tattoo
    An artist tattoos bananas using a small pin to create bruising on the peel
    Video
    Amazing Art
  • NYC parks
    New York City parks are ideal places to hang out and relax with your loved ones
    Camera
    5 Photos
  • Solar panels
    Solar panels can cut electric bill and may make you money
    Green Living
  • Longevity
    Awesome 111-year-old credits longevity to smokes and booze
    Top Story
  • Reading fiction builds skills
    Reading literary fiction builds mind-reading skills, says study
    Theory of Mind
  • Art bra
    Group of breast cancer sufferers uses creativity and art to cope with breast cancer
    Video
    Survivor

Related Videos:

  • Sean Phillips is charged with open murder of missing Baby Kate
    <iframe width="420" height="315" src="//www.youtube.com/embed/8MNiTFgtREk?VQ=HD720&amp;autoplay=1"></iframe>
  • Forget Me Nots remind us of those we've lost
    <iframe width="560" height="315" src="//www.youtube.com/embed/G2EoOYkdu_E?VQ=HD720&amp;autoplay=1"></iframe>
  • Emergency room visits for kids with sports-related brain injuries skyrocketing
    <script type="text/javascript" src="http://pshared.5min.com/Scripts/PlayerSeed.js?sid=1304&amp;amp;width=480&amp;amp;height=401&amp;amp;playList=517529003&amp;amp;autoStart=true&amp;amp;autoStart=true&amp;amp;cbLocation=Custom&amp;amp;cbCustomID=companion-ad-container&amp;amp;onPrerollEnded=hide5MinAdContainer&amp;autoStart=true&amp;cbLocation=Custom&amp;cbCustomID=companion-ad-container&amp;onPrerollEnded=hide5MinAdContainer"></script><script type="text/javascript"> function hide5MinAdContainer() { // Hide the companion ad container. document.getElementById('companion-ad-container').style.display = 'none'; } </script>

User login

Log in
Sign in with your email and password. Or reset your password.
Write for us
Interested in becoming an Examiner and sharing your experience and passion? We're always looking for quality writers. Find out more about Examiner.com and apply today!