Is it possible to hack any password? | Real Bruteforce Experiment

39,293
0
Published 2023-12-01
👾 Follow this link to know more protect yourself from fraudsters: sumsub.com/liveness/

In this experimental video, we’ll explore the possibility of hacking any password using bruteforce. You're gonna see a step-by-step breakdown of the process. We showcase the tools and techniques commonly used by hackers in order to show the vulnerabilities in password security.

You will find out about practical tips on creating strong, unique passwords and explore additional measures like two-factor authentication.

Don't miss out! Watch now and elevate your knowledge of password security.

#bruteforce #bruteforcing #hacking #sumsub #wifi

00:00 Time to hack a password
02:45 What is offline bruteforcing?
03:52 How can you be hacked?
04:42 What is a Hash?
06:24 Bruteforcing process
13:17 Verification Tool
14:02 Tips from Bruteforcing
16:32 The End

Sumsub — empowering compliance and anti-fraud teams to fight money laundering, terrorist financing, and online fraud.

More about us:
sumsub.com/
twitter.com/Sumsubcom
www.instagram.com/sumsubcom/
www.linkedin.com/company/18232778/admin/

All Comments (21)
  • @Sumsubcom
    Have you ever encountered password theft and what were the consequences? Tell the most interesting stories under this comment ;)
  • @dipperskrrt758
    love the way how you organise and show things in videos , excellent
  • @blaxbrian6877
    kali has most of the tools youre using..... hash identifiers, hydra , john, mimikatz etc::::::: i think being security concious is the first step in staying safe while using computers
  • @PeterM-eh5ji
    Amazing vid! Was not aware of how bad is my cyber security xD
  • Great vid. Best Ive seen to explain this to non-techies. What isnt addressed 1. The computational complexity of muliple words in sequence (obfuscated with special chars) - a method many people (even geeks) use to remember the very few that must be remembered (hopefully one), 2. Combination of any method with bio-measurement (eg facial recognition, fingerprint recognition, iris recognition). How vulnerable is this if hashing is local to the device, 3. Apple’s new passkeys (sounds awfully like ssh to me).
  • @RealGlitchKing
    I saw the pwnagotchi video and was like "damn, instant sub"
  • @ewellynn122
    This video was helpful, at least now I can crack my own passwords if I forget them... And if I can't, that means that I've chosen really good passwords...
  • @jaxjax2011
    If you had a dataset of all the hashes of the password combinations you just described people using, would it not be faster to check a hash against this dataset than it is to re-hash every combination? If you had a 10TB storage unit, you could store about 4 billion hashes. You said that a graphics card could do about a million hashes a second, so 4 billion hashes would take about an hour on average to produce. If it takes 6 hours to go through all those common combinations, you'd just need 60TB of storage to have all of those combinations on hand. They would have to have an index to attach them to whatever password generates that hash in a different database. For 24 billion hashes (if that is our number) that would require an 11-bit or 2-byte index for each hash, which only increases the storage requirement by less than a terabyte. If your storage had a throughput of 3500 MB/s, then it would take you about 4.8 hours at most to find the correct hash, which is only 20% faster. Let's say you had the dataset of hashes divided among 10 computers, though, and you fed each of them the target hash. It would take less than half an hour to do the same work. If you had 100 computers, it would take less than 3 minutes. If you had a thousand computers, it would only take seconds. You could optimize the comparison with sorting algorithms as well. Only search the region of the dataset which matches the first byte of the hash and that'd speed it up by a factor of 256, which split among multiple computers could bring your time to crack down to milliseconds. Your server receives a hash, sends that hash to a farm that compares it to an optimized dataset of all common passwords, and returns the password near instantly.
  • @elmeromero303
    Never had issues with Bruteforce on my (own) Servers/Services. Just lock Accounts (or/and IP) Policy after 5 unsuccessfully attems. If you "allow" Brute Force.. its up to you.
  • @Pretended1168
    Luckily I changed my password after your short to the one you use in the video. Because It's super secure.
  • @amansaiyed5909
    Sir, You cover the topics very well ❤ I have come to understand When will the next video come sir?❤ Il
  • @surajpanditexe
    Your videos made me a lot more privacy conscious 😅 thanks brother love from india 🇮🇳
  • @cluodalex2794
    What is the distro you used? I wanted to download it please 🌹
  • What programming language will need to learn to do for security in data center? I’m interested in Kotlin, will it help?
  • @TalesYeap
    What operation system are you using?