mailing list archives
Re: Senior M$ member says stop using passwords completely!
From: stephane nasdrovisky <stephane.nasdrovisky () paradigmo com>
Date: Wed, 20 Oct 2004 08:43:54 +0200
Todd Towles wrote:
If my memory is right, lm passwords are hashed as 2*7 uppercase bytes
(which is not the same as 14 bytes, it's easier to bf)
If lm passwords are enabled, even longer passwords will collide with a
14 characters password (as far as you're more interested in accessing
one's account than knowing its dog's name, i.e. if your pass is "My name
is bond, james bond!", using "MY NAME IS BON" will give you the access
Back in the nt 4.0 time, it was required to disable lm passwords (w95
compatibility issue) in order to have stronger passwords (if nt password
fails, lm password is checked).
I was under the understand that passwords of over 14 characters were
stored with a more secure hash, therefore 14 characters passwords were
harder to crack, due to the more secure hash. Windows will create two
different hashes for passwords shorting than 14 characters, I do
Just use a non-printable character in your password and cracking is
useless...if they crack it, they can't read what they cracked. ;)
Full-Disclosure - We believe in it.