Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: antiRepublicrat
So you set the password policy far beyond that which is used by almost all organizations, something rarely found in practice, to get something that Rainbow Crack can't crack. Sorry, I'm not interested in something that unrealistic.

Let's just follow one of the biggest users of Microsoft technology. I'll pick a branch of the Military and use their standard. That would be realistic, right?

566 posted on 09/01/2005 9:41:07 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 562 | View Replies ]


To: for-q-clinton
I'll pick a branch of the Military and use their standard. That would be realistic, right?

I'll pick one currently in Army use right now on thousands of Windows and some UNIX systems in an environment that ranges from FOUO to TS: 10 characters, no dictionary, minumums: two uppercase, two lowercase, two numbers, two symbols (picked from any found on a standard keyboard).

Rainbow Crack will break all of them with a 99.9% probability. The RC screen output here (notice the very strong passwords) has it cracking longer passwords than that. In fact, it cracked ten of them in under six minutes. No table big enough exists to crack those passwords on a modern *NIX.

569 posted on 09/01/2005 10:43:08 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 566 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson