💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › HNET › hnet0109.hac captured on 2022-06-12 at 12:15:21.

View Raw

More Information

-=-=-=-=-=-=-

                H-NET H-NET H-NET H-NET H-NET H-NET H-NET H
                N                                         N
                E          ** H-Net Magazine **           E
                T                                         T
                H   Volume One, Issue 1, File #09 of 20   H
                N                                         N
                E      How to Crack Those PASSWORDS!      E
                T                                         T
                H-NET H-NET H-NET H-NET H-NET H-NET H-NET H

                   THE SO-CALLED "UNCRACKABLE" PASSWORD 
                  --------------------------------------   

Many people consider the type of password - the so-  called random combination 
of alpha and numeric characters  - to be "uncrackable" because so many billions 
of  combinations seem possible. A six-character password of  this type using 
only letters and numerals, could have  2,238,976,116 variations. This type of 
password is most  frequently used by large data-base vendors. It is assigned 
 to the user by the vendor, and is often used with systems  requiring only one 
access level (that is, no second  security number) because the password is 
believed to be so  invulnerable to cracking.    

In reality, however, this password format is vulnerable  to solution by both 
doors and algorithms. In the first case, not all passwords require the presence 
of numbers. Passwords may be alphabetic characters only. In some cases pass- 
words such as "GUEST" or "IBMCE" may provide a backdoor into the system.

Solution by algorithmcan also be simple because most systems do not use a truly 
random method for generating passwords.  We know, for example, that MILNET 
passwords exclude certain letters and numbers. There are doubtlessly other 
rules involved  in their construction that we could discover. A study of pass- 
words from a given system - we'll use Dow Jones  as an example here - can 
reveal the patterns that are used to create such "uncrackable" passwords.

Dow Jones passwords are generally 10 characters long. If character assignment 
were truly random, we would expect that most of the characters would be alpha- 
betic because there are 26 alpha characters compared to only 10 numeric char- 
acters. A random system would generate 2.6 alphas for each numeric character. 
In fact, however, Dow Jones passwords appear to have only 4 or 5 alphabetic and 
have 5 or 6 numeric characters. This is our first clue that the password sel- 
ection proccess is not random. Here is a sample of the typical Dow Jones 
passwords:              

92J62P4BUF             
35K4UPK931             
59LTAN7521  

Patterns are readily discernable:             

1) The first two characters are numbers             
2) The third character is a letter of the alphabet             
3) Each password has at least two numbers that are duplicates. 
4) No password has three numbers that are the same             
5) Each password has one three-letter combination that includes a vowel 
   (eg. BUF,UPK,TAN)             
6) This alpha-triplet can begin at any character from the fourth to the eighth 
   position.             
7) No password has more than one vowel.             
8) Passwords may have either 4 or 5 alphabetic characters.             
9) While a password may have two alpha characters that are the same,these 
   letters do not follow one another,             
10) Of the 16 numbers used in the passwords above, none is a zero. 

Examination of a large number of passwords would doubtlessly reveal other 
"rules" that were used in Dow Jones password selection. Each newly-discovered 
"rule" would limit the actual number of available passwords and make the system 
that much more subject to cracking by computer.                  

TAKING THE "RANDOM" OUT OF RANDOM    

One of the most notable factors in so-called tables of computerized "random" 
numbers is that there are two basic ways of creating them. The first method is 
to create a table that will provide what can statistically be said to be a 
random list - that is no number or letter would theoretically occur more 
frequently than any other number or letter. Most systems, however, simply rely 
on an electronic component that creates alledgedly "random" numbers. These 
hardware random number generators are usually biased in their number selections 

One simple test of a random number generator is called the  "coin toss test." A 
program is written to simulate the results of a thousand or so coin tosses. 
Were the random number generator truly random, heads would appear about as 
frequently as tails. In an actual test, however, heads appeared 421 times, and 
tails appeared 579 times - a significant bias. A test such as this could be 
performed over the entire alphanumeric character list and the component's bias 
chartered.  Once this information was known, the cracking computer could be 
programmed to insert this selection bias into it's own attempts to generate 
passwords. This is yet another step that evens the odds between the hacker and 
the so-called "uncrackable" password. This testing scheme, requiring either a 
component or a computer like the target computer, would be a lengthy process, 
but some people might regard the product as worth the time involved in 
preparing such an analysis. A strategy of cracking Dow Jones system, given the 
rules listed above, would be to create a program with an algorithm that 
provided  combinations of passwords meeting the criteria above. As each 
creation was tested, a pattern might be found in the successful creations that 
would make the algorithm even more selective. One would expect, for example, 
that simular to the MILNET and ARPANET passwords, certain confusing characters 
would be eliminated from passwords. The number, "0" is often eliminated, for 
example, because it is easily confused with the letter "O".

===============================================================================
[Hackernet BBS,LEEDS,UK(0532)557739, 24hrs. Home of H-Net Hacking magazine]