Ακόμα μία εφαρμογή για να ανακτήσετε το χαμένο εργοστασιακό κωδικό του ρουτερ σας, αυτή την φορά μέσα από συσκευές android. Όπως μας λέει και ο δημιουργός της και δεν έχουμε κανέναν λόγο να μην τον πιστέψουμε:
«Η Εφαρμογή πραγματοποιεί Ανάκτηση ΕΡΓΟΣΤΑΣΙΑΚΩΝ κωδικών από συγκεκριμένες μάρκες router και σας βοηθάει να δοκιμάσετε την ασφάλεια του ΔΙΚΟΥ ΣΑΣ δικτύου. Σε περίπτωση που συνδεθείτε σε κάποιο ξένο δίκτυο με την βοήθεια της εφαρμογής, οφείλετε να ενημερώσετε τον ιδιοκτήτη του δικτύου αυτού για το κενό ασφάλειας που ανακαλύψατε έτσι ώστε να αλλάξει τον κωδικό του.»
Αν είστε από υπολογιστή, κατεβάστε την εφαρμογή μέσω του QR code:
Our team launched our first hack. This is for the game League of Legends. One of the most played games in 2013. Until now there has been released a hack for this game. League of Legends Riot Points Generator is
very easy to use and is nedetcatabil. You will have no problems. November update the hack every 2 weeks.
With League of Legends Riot Points Generator you can add unlimited Riot Point .
Since the popularity of text messages have significantly increased during the recent years, it has also become a popular channel for most people to exchange secret messages and engage in dubious activities. Therefore, in order to find out the truth sometimes it becomes obligatory to spy on text messages such as WhatsApp, Viber and FB Messenger. Particularly if you are a parent or an employer, it becomes your right to spy so as to investigate what is happening with your child or employee.
Popular Ways to Spy on Text Messages
The following are some of the commonly used methods to spy on text messages like as SMS, IM chat conversations and Emails.
1. Using a Spying App: The Easiest Way
Today, even though there exists a large number of mobile apps to spy on text messages, many are simply overpriced and some will never really stand up with the competition at all. However, there are a few spy apps that are really worth stating and mSpy Premium is one among them. When it comes to spying on text messages, mSpy Premium is my favorite one. In addition to SMS, this app is capable of spying on various text messaging apps like WhatsApp, Viber, Snapchat, iMessage, Skype and many more.
The following are some of the exciting features of mSpy Premium which makes it a perfect choice for spying on text messages:
Spy on call logs, SMS and Contacts
Secretly record emails, web history and bookmarks.
Spy on Internet activity including social media like Facebook, Twitter and Gmail.
Spy on text messaging apps like WhatsApp, iMessage, Viber, Snapchat, Skype, LINE and more.
Track GPS locations in real-time.
Record keystrokes, photos and videos.
Operates in a complete stealth mode and remains undetected!.
For parents and employers, mSpy Premium can offer an additional help as it supports a handful of control features as well:
Block access to unwanted apps and calls.
Remotely lock the phone or restrict its usage.
Remotely delete unwanted contacts, call logs, SMS and photos if desired.
Get instant alerts when profane language is typed or viewed.
Watch mSpy Premium Demo
You can take a look at the live demo of mSpy Premium in action from the following link:
After you order mSpy Premium you will need to install the app onto the target phone which will only take 2-3 minutes to complete. If you need any assistance, the support team is ready to help you out any time you need.
Once the installation is complete, all of the recorded text messages and data will show on your online dashboard which can be accessed from any web browser across the world as shown in the demo.
Compatible Phones: Android, BlackBerry, iPhone, iPad, Windows Mobile and Tablets.
2. Using a SIM Card Reader to Recover Text Messages
If you can’t really afford a spying app, you can buy a cheap SIM card reader from the market and use the target person’s SIM to recover text messages, phone contacts and email addresses stored on it. This can be done using the following steps:
Switch Off the target phone and remove the SIM card from it.
Insert the SIM card into the SIM card reader and plug-in the SIM card reader to the USB port on your personal computer.
If your SIM card comes with a software CD/DVD, install it on your computer. This will help you recover any of the stored text messages from the SIM and store it on your PC for later review.
It is needless to mention that this method has clear drawbacks as there are chances of text messages from being deleted from the SIM before you get access to it. Also this method can only recover SMS (stored on SIM) and not other text messages from messaging apps like as WhatsApp, Viber, Snapchat etc.
Therefore to overcome this drawback I still recommend the usage of spying app like mSpy Premium to spy on text messages.
Some 100 Million cars made by Volkswagen are vulnerable to a key cloning attack that could allow thieves to unlock the doors of most popular cars remotely through a wireless signal, according to new research.
Next time when you leave your car in a parking lot, make sure you don't leave your valuables in it, especially if it's a Volkswagen.
What's more worrisome?
The new attack applies to practically every car Volkswagen has sold since 1995.
There are two distinct vulnerabilities present in almost every car sold by Volkswagen group after 1995, including models from Audi, Skoda, Fiat, Citroen, Ford and Peugeot.
Computer scientists from the University of Birmingham and the German engineering firm Kasper & Oswald plan to present their research [PDF] later this week at the Usenix security conference in Austin, Texas.
Attack 1 — Using Arduino-based RF Transceiver (Cost $40)
The first attack can be carried out using a cheap radio device that can be made for just $40 with a small control board and a radio receiver, but is capable of eavesdropping and recording the rolling code values used by keyless entry systems.
The code values are included in the signal sent every time a driver presses the key fob’s buttons, which is then used together to emulate a key that is unique to every vehicle.
The researchers then managed to reverse engineer one component inside a Volkswagen's network and were able to extract a cryptographic key that is shared among millions of Volkswagen vehicles.
Now, combining the two supposedly secret keys, the researchers were able to clone the key fob and access to the car.
"With the knowledge of these keys, an adversary only has to eavesdrop a single signal from a target remote control," the researchers wrote in their paper. "Afterwards, he can decrypt this signal, obtain the current UID and counter value, and create a clone of the original remote control to lock or unlock any door of the target vehicle an arbitrary number of times."
Although the team did not reveal the components they used to extract the keys to prevent potential car hackers from exploiting the weakness.
However, they warned that if skilled hackers find and publicize those shared keys, each one could leave tens of Millions of cars vulnerable.
In past 20 years, just the four most common keys are used in all the 100 Million cars sold by Volkswagen. Only the most recent VW Golf 7 model and others that use unique keys are immune to the attack.
Attack 2 — Hijack with HiTag2 and A Radio Device in 60 Seconds
In the second attack, the team managed to attack a cryptographic scheme called HiTag2 -- decades old rolling code scheme but still used in Millions of vehicles, including Alfa Romeo, Chevrolet, Peugeot, Lancia, Opel, Renault, and Ford.
To carry out this attack, all a hacker needs is a radio setup similar to the one used in the above hack.
Using a radio device, the researchers were able to intercept and read a string of the coded signals (rolling code number that changes unpredictably with every button press) from the driver's key fob.
With the collection of rolling codes, the researchers discovered that flaws in the HiTag2 scheme would allow them to crack the cryptographic key in as little as one minute.
Since the above two attacks focus on unlocking cars rather than stealing them, the lead researcher Flavio Garcia told Wired these attacks might be combined with already exposed bugs in the HiTag2 and Megamos 'immobilizer' systems, allowing "Millions of Volkswagens and other vehicles ranging from Audis to Cadillacs to Porsches to be driven by thieves."
This is not the first time this team of researchers has targeted Volkswagen, it discovered a way to start Volkswagen cars' ignitions in 2013, but had to withhold their findings for two years because VW Group threatened to sue them.
The researchers have reported the flaws to VW Group and agreed not to disclose the cryptographic keys, part numbers of vulnerable components, and how they reverse-engineered the processes.
Car hacking is a hot topic today. Recently, security researcher Benjamin Kunz Mejri disclosed zero-day flaws resided in the official BMW web domain and ConnectedDrive portal that allowed attackers totamper remotely with BMW's In-Car Infotainment System.
Previous research demonstrated hackers capabilities to hack a car remotely and control its steering and brakes and to disable car's critical functions like airbags by exploiting security bugs affecting significant automobiles.
Keeping these risks in mind, in April this year, the Michigan state Senate proposed two bills that introduce life sentences in prison for people who hack into cars’ electronic systems. Also, the FBI issued a public announcement warning people about the risks of car hacking.
ToGreek WPA Finder, είναι ένα εργαλείο που βοηθάει στον έλεγχο ασφαλείας του δικού σας δικτύου. Η εφαρμογή έχει τη δυνατότητα να ανακτά τους εργοστασιακούς κωδικούς, πολλών μοντέλων router, οπότε μπορείτε να διαπιστώσετε εάν στο δίκτυο σας υπάρχει κάποιο κενό ασφαλείας.
ΠΡΟΣΟΧΉ!! Εφαρμόστε το μόνο στο δικό σας router, και εάν συνδεθείτε σε κάποιο ξένο δίκτυο είστε υποχρεωμένοι να ενημερώσετε τον ιδιοκτήτη του για να διορθώσει το κενό ασφαλείας.
Μέγεθος
Έκδοση
Λειτουργικό
1.7 MB
3.6.5
Android 2.2+
========================= DOWNLOAD HERE ============================
Πρόκειται για μια ελληνική εφαρμογή για την Android συσκευή σας που μπορείτε να κατεβάσετε δωρεάν και η οποία περιέχει Wi-Fi κωδικούς στην περιοχή που βρίσκεστε. Η εφαρμογή βρίσκεται προς το παρόν σε Beta (δοκιμαστική) έκδοση και παρακάτω μπορείτε να δείτε την περιγραφή της.
O WiFi Sherlockσας βοηθάει να ανακαλύψετε wifi κλειδιά από περιοχές γύρω σας. Βρίσκεστε κοντά σε καφετέρια, γυμναστήριο, εμπορικό κέντρο που προσφέρει ελεύθερο wifi στους πελάτες; O WiFi Sherlock μπορεί να το ανακαλύψει και να σας δώσει τον κωδικό του wifi (Αν είναι διαθέσιμος) Όλοι οι κωδικοί μοιράζονται από τους χρήστες. Μπορεί να συνεισφέρει ο καθένας.
Ο WiFi Sherlock χρησιμοποιεί τις υπηρεσίες του FOURSQUARE για να πετύχει αυτό που κάνει. Έχει γίνει μεγάλη προσπάθεια στην Βελτιστοποίηση του έτσι ώστε να σας δίνει τους πιο πρόσφατους κωδικούς με τον ταχύτερο δυνατό τρόπο σε αντίθεσή με παρόμοιες εφαρμογές όπου το περιεχόμενό των κωδικών τους είναι παλιό και μη ενημερωμένο.
There are MANY methods to change your IP address. Some methods will work for you but may not work for someone else and vice versa. We’re going to cover how to change your IP address in Windows 2000, XP, 2003, and Vista using command prompt.
What If I Have a Static IP Address?
If your IP is static, then you CAN’T change it without contacting your ISP. Although not impossible, it is very rare that an ISP would assign you a static IP without some sort of increased level of service like a business account. However, an ISP can set a lengthy lease time for your IP address and make it look like you’ve assigned a static IP. If you have a long lease time (explained in this article) on your IP then you may not be able to change your IP address without leaving your modem or router unplugged for a long period of time (more than 8 hours), or without cloning your MAC address, which I’ll explain later in this article.
It definitely helps if you know how the IP is being assigned to you.
You can read our DHCP definition to get a better understanding.
What Is An IP Address Lease Time?
An IP lease time is the amount of time your ISP determines you’ll be assigned a particular IP. Some IP lease times could be just a couple of hours, where some are set to a few days, and other IP lease times could be set for as long as a year or more. This setting is completely up to your ISP.
One of the easier methods to change your IP address is to turn off your modem/router/computer overnight. Then turn it back on the following morning. This method WILL NOT work if your ISP has a long lease time set for your IP.
The following method will ONLY work if your computer is being assigned your external IP and not a router.
If your connection is direct to your computer and your computer gets the public IP and not a router, you can try this:
For Windows 2000, XP, and 2003
1. Click Start
2. Click Run
3. Type in cmd and hit ok (this opens a Command Prompt)
4. Type ipconfig /release and hit enter
5. Click Start, Control Panel, and open Network Connections
6. Find and Right click on the active Local Area Connection and choose Properties
7. Double-click on the Internet Protocol (TCP/IP)
8. Click on Use the following IP address
9. Enter a false IP like 123.123.123.123
10. Press Tab and the Subnet Mask section will populate with default numbers
11. Hit OK twice
12. Right click the active Local Area Connection again and choose Properties
13. Double-click on the Internet Protocol (TCP/IP)
14. Choose Obtain an IP address automatically
15. Hit OK twice
16. Go to What Is My IP to see if you have a new IP address
For Vista (Windows 7 is very similar)
1. Click Start
2. Click All Programs expand the Accessories menu
3. In the Accessories menu, Right Click Command Prompt and choose Run as administrator
4. Type ipconfig /release and hit enter
5. Click Start, Control Panel, and open Network and Sharing Center. Depending on your view, you may have to click Network and Internet before you see the Network and Sharing Center icon
6. From the Tasks menu on the left, choose Manage Network Connections
7. Find and Right click on the active Local Area Connection and choose Properties (If you’re hit with a UAC prompt, choose Continue)
8. Double-click on Internet Protocol Version 4 (TCP/IPv4)
9. Click on Use the following IP address
10. Enter a false IP like 123.123.123.123
11. Press Tab and the Subnet Mask section will populate with default numbers
12. Hit OK twice
13. Right click the active Local Area Connection again and choose Properties
14. Double-click on Internet Protocol Version 4 (TCP/IPv4)
15. Choose Obtain an IP address automatically
16. Hit OK twice
17. Go to What Is My IP to see if you have a new IP address
Some people have inquired about manually assigning their IP address. This IS possible, but you run a very high risk of your ISP banning you from connecting to the internet. To manually change your IP, follow the steps above for your Operating System. In step 9 or 10, depending on your O/S, enter an IP similar to the one displayed in the command prompt window. For example, if the IP displayed in the command prompt window is 75.1.2.3, change yours to 75.1.2.4. You’ll also need to manually enter the Subnet, Gateway and DNS Server IP addresses. If the new IP you give your computer doesn’t work, chances are someone else on the ISP network has already been assigned that IP. You’ll need to move on to the next one and keep trying until you find an open one. Keep in mind that some ISPs match up your MAC or modem data to the address that’s been assigned. If those 2 things don’t match up, you won’t be able to connect no matter what. If your router gets the IP and not your computer, you’ll need to http in to your routers interface and manually assign the IP there. It’s pretty much the same method as assigning the IP to your computer. The method that varies is in how you reach your routers interface. You can get the instructions from your manufacturer’s website.
MAC Cloning. What is a MAC address? A MAC address is a physical hardware address assigned to each device that has the capability of connecting to a network. The internet is nothing more than a large network. The MAC address is something that is assigned in the chip on the device and is not something the user can change. MAC cloning can only be done at your router providing it has those capabilities. Most ISPs assign their IPs based on the MAC address in your equipment. If the MAC address of your router is 00-11-22-33-44-55 and you connect to your ISP, the DHCP server records your MAC and assigns an IP. If you disconnect from the ISP, you lose your IP address. The next time you connect, the DHCP server sees your MAC, looks to see if it has assigned an IP address to you before. If it has and the lease time has not expired, it will most likely give you the same IP address you had before disconnecting and will not change your IP.
Why Clone a MAC Address?
Getting a new MAC address most likely equals a new IP. How to clone your MAC and if your router has this feature is dependent on the router itself. You’ll need to find the instructions on the manufacturer’s website. We offer a Quick Reference List on our Router Support page.
(Media Access Control Address) is a unique identifier assigned to network interfaces for communications on the physical network segment.
WAP
(Wireless Access Point) is a device that allows wireless devices to connect to a wired network using Wi-Fi
BSSID
(Basic Service Set Identification) is the MAC address of the WAP
ESSID
(Extended Service Set Identification) is the display name of the wireless network
WPA/WPA2
(Wi-Fi Protected Access / Wi-Fi Protected Access II) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks.
PSK
(Pre-Shared Key) is the term for the password defined in WPA/WPA2 encrypted networks.
Before we Begin:
The methods and tools used in this WPA / WPA2 hacking tutorial can be utilized without any previous knowledge, however it is best for the attacker to have an understanding of what is going on behind the scenes. My job with this tutorial is to break down each step of the attack process and explain it in a simplified manner. Assuming that the reader of this guide has no previous knowledge with hacking, Linux, or Network Security, I will take it slow (one step at a time). I know this stuff can be intimidating for beginners, but just follow the steps and you will start to understand the fundamentals of what is going on to be better protected against future malicious users.
It is important to note that hacking WEP is simple and is widely recognized as an inefficient encryption technique, thus why I have not covered it in this tutorial. Although WEP still exists in many places, most wireless networks these days have been configured with WPA/WPA2-PSK which are vulnerable to brute force attacks. I will explain that the success of hacking WPA/WPA2-PSK is only as good as the word list you are comparing against.
Step 1: Set up the VMware Software
Download and Install Required Software (FREE)
For the purpose of keeping this blog short, I am not going to provide instructions on how to download and install the VMware software. But the link and information to install VMware Player can be found below:
After VMware is installed, you are going to want to download the Backtrack 5 R3 (32bit) virtual machine from the following link. Backtrack 5 is a Linux distribution that is used for many different types of penetration testing/network security and much more. The download is archived using 7-zip so you will have to extract the contents before using.
With the software installed, make sure you are able to power up the virtual machine successfully. I have both Backtrack 5 R3 and the VMware View software running off my USB drive so I can operate it from any computer at any time. I have not seen any reduction really in performance because I am not really writing to the drive while its up and running.
USB Device with Backtrack + VMware Player
Step 2: Preparation for the Attack!
If you are not familiar with command prompt or terminal then some of this may look a little foreign but I am going to break it down as best I can, and if you follow my instructions and type exactly as shown, there should not be any issue and you should be on your way to becoming a network penetration tester in no time!
Part I: View Network Interface Information
Since my internal wireless adapter does not support monitor mode, I have purchased an Alfa AWUS036H Long-Range 802.11N USB Network Adapter (~$38).
Alfa AWUS036H Wireless USB Adapter
This of course is only needed in the case that your internal wireless adapter is not compatible. However, most USB wireless adapters will work with this process. I simply plug it into my USB port and make sure it is recognized in the virtual machine.
To view a list of the recognized interfaces, open up the console and type in the following command and press enter.
1
ifconfig
ifconfig – command to view interfaces
ifconfig command
We need to shut down the interface before we spoof the MAC address because the interface cannot be in operation during this time.Type the below command and press enter
1
ifconfig wlan0 down
wlan0 – network interface down – shut down interface
ifconfig down command
Now we can spoof the MAC address of the network adapter, in this case we are just going to set a static “phony” MAC address of 00:11:22:33:44:55. Type the below command and press enter.
1
macchanger -m 00:11:22:33:44:55
macchanger – command to spoof MAC Address -m 00:11:22:33:44:55 – specifying the MAC Address to spoof
Then after, we need to turn on the interface after the spoofed MAC address succeeded. Type the below command after MAC address spoof is finished and pressenter
1
iwconfig wlan0 up
up – turn interface on
macchanger command
Part II: Enable “Monitor Mode” on your Network Adapter
Monitor mode will allow your network adapter to view all network traffic within range, along with identifying information for each network found. This command will activate monitor mode on mon0. You will be presented with a message stating that “Monitor mode enabled on mon0″
1
airmon-ng start wlan0
airmon-ng – command for monitor mode start wlan0 – starting monitor mode on wlan0 interface
monitor mode command
Part III: Verify “Monitor Mode” is enabled
Verify mon0 on the list of interfaces. To see the configuration of the monitor mode interface, type the following command and press enter. You should then see mon0 listed in the command results
1
iwconfig mon0
iwconfig – command to view interface configuration mon0 – interface used in monitor mode
Verify Monitor Mode
At this point, all the preparation is complete and we are now ready to move on to the fun stuff. The next stage will be choosing what network to perform the attack on. Legal note: Hacking into networks is illegal, make sure you have been granted permission to test, or perform this on your own equipment. I cannot be liable for any misuse!
Step 3: Begin the Attack!
Now that the network interface is configured properly to monitor network traffic within range, we can proceed to selecting a target and performing the actual brute force attack.
Part I: Choose your victim!
Lets take a look at some of the network traffic within range of the wireless adapter. With the console still open, type in the following command and hit enter.
1
airodump-ng mon0
airodump-ng – command to view networks in range
List of Victims
As described above, you will be presented with an active list of all networks within range. The network that I have selected is my own. You see it labeled as “HackThisWiFi”. Here is the information that we will need for the next set of commands.
Part II: View all clients connected to Access Point
Now that we know which network to attack, we have to monitor that specific network and reveal any clients that may or may not be connected at that given time. In order for WPA / WPA2 hacking to work, it must capture the 4-way handshake that is accomplished when the client authenticates to the access point (AP).
Not only will we be viewing connected clients, but we will be capturing data specific to the HackThisWiFi access point and storing it to a capture file called “hackwpa”, type the following command and press enter.
00:23:69:98:AC:05 – Access Point MAC Address -c 4 – Channel 4 -w hackwpa – write to file “hackwpa” mon0 - network interface
View Clients of Access Point
Part III: DoS the Access Point
Denial of Service (DoS) is a good way to accelerate the process of capturing the 4-way handshake because it sends a message to the client saying that that it is no longer associated with the Access Point. The reauthentication is what generates the 4-way authentication handshake we are interested in collecting. This is what we use to break the WPA/WPA2 pre-shared key.
The following command will deauthenticate clients to hopefully force them to reauthenticate.
1
aireplay-ng -0 30 -a 00:23:69:98:AC:05 mon0
-0 30 – Send 30 DeAuth requests -a 00:23:69:98:AC:05 – Access Point MAC Address mon0 – Network Interface
Deauthenticate AP clients
Now that the clients have been deauthenticated from the AP, and the handshake has been captured sucessfully, we can start to process of cracking the PSK. (And you thought you were safe! ^-^)
Step 4: Time for PWNAGE!
Time to Crack the WPA / WPA2 Encryption using Aircrack
To accomplish this, you must have some type of wordlist to compare against the captured PSK. It essentially will check down the wordlist one by one until it reaches the correct key. This can be a very time consuming process and it takes quite a bit of processing power to execute. The faster your computer, the faster the key can be cracked. See the fun facts at the bottom of this post to get an understanding of password recovery speeds. There is also small dictionary that comes with aircrack-ng – “password.lst”. The file is found in the “test” directory of the aircrack-ng source code. Just send me an email and I can either send you my wordlist or show you how to create your own using crunch (default with Backtrack 5 R3).
aircrack-ng – command for the password cracker -w wordlist.lst – specifying the wordlist to use (wordlist.lst) -b 00:23:69:98:AC:05 – specifying the bssid of the AP hackwpa*.cap – specifying the capture file
Aircrack command to crack PSK
Let the password cracker work with as much processing resources as possible, it could take a long time depending on the complexity of the WiFi password used. In my case, I placed the PSK near the top of the text file so I did not have to wait very long for the cracker to parse the wordlist one by one. This would not be possible if I was not aware of the PSK prior, and I would have to wait until every string in the wordlist is compared.
WPA / WPA2 Hack Complete
Protection Against Brute Force WPA / WPA2 Attacks
There are many ways to help protect and defend against brute-force attacks, here are a few tips to keep your WiFi a little safer from malicious intruders
Setup MAC Address Filtering on Router
This makes it so that only specifically “whitelisted” devices are able to connect to your network. But as you know, a savvy hacker can also monitor the MAC address of a whitelisted client and then spoof their own MAC to gain access. Most of the time, this is not the case…
Use a Complex Passphrase:
Using a combination of special characters, lowercase and uppercase letters, and also numberic characters can make the process of brute-forcing so time intensive that a hacker may just give up and move to an easier target. For my own network, I do not use a passphrase less than 15 characters in length. An example of a “safe” password would be “Th3Sm1ThF@mi1yWirEles$NeTw0rk2013″. By using a relatively easy sentence and changing some characters around to dramatically increase the complexity, it would take years for this password to be brute-forced.
Change the Password Frequently:
Like shown above, it could take hours, weeks, even years to brute-force passwords. If you change it on a regular basis, then you are going to be one step ahead of your potential attacker.
Turn off your router when you are not home:
If you are not using the WiFi when you are away, why have it on? It only allows an attacker more time to find vulnerabilities to gain access. If you only have your WiFi on when you are home, then you are drastically reducing the attack-time of the malicious hacker
Fun Facts:
Some interesting statistics regarding password recovery speeds. This speeds listed here are estimates of the maximum time it would take a common dual-core workstation to brute force various types of passwords. Keep in mind that a lot of people these days have quad-cores or clusters of computers that make the password recovery speeds drastically more efficient.
Numerals [0-9]
0123456789
10 Character Password: 2 ¾ Hours
Only Upper Case Alpha [A-Z] -or- Only Lower Case Alpha [a-z]
ABCDEFGHIJKLMNOPQRSTUVWXYZ -or- abcdefghijklmnopqrstuvwxyz
8 Character Password: 5 ¾ Hours
Only Upper Case Alpha [A-Z] -or- Only Lower Case Alpha [a-z]
+ Numerals [0-9]
0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ -or- 0123456789abcdefghijklmnopqrstuvwxyz
5 Character Password: Instant
Upper Case Alpha [A-Z] + Lower Case Alpha [a-z]
AaBbCcDdEeFfGgHhIiJjKkLlMmNnOoPpQqRrSsTtUuVvWwXxYyZz
8 Character Password: 62 Days
Upper Case Alpha [A-Z] + Lower Case Alpha [a-z] + Numerals [0-9]
0123456789AaBbCcDdEeFfGgHhIiJjKkLlMmNnOoPpQqRrSsTtUuVvWwXxYyZz
8 Character Password: 253 Days
Upper Case Alpha [A-Z] + Lower Case Alpha [a-z] + Special Char
AaBbCcDdEeFfGgHhIiJjKkLlMmNnOoPpQqRrSsTtUuVvWwXxYyZz!”#$%&’()*+,-./:;?@[\]^_`{|}~
8 Character Password: 23 Years
As always, thanks for reading and please make sure to drop a comment below with your thoughts.