How will attackers try to break into your account?

To understand how to create a strong password, it is important to understand how hackers will try to crack your password. Brute force attacks attempt to guess a password correctly by starting at one character and iterating through all possibilities. Usually a hacker will write a program to do this for them.

Brute Force Example

TIP

Example “aaaa” “aaab” “aaac” “aaad” etc.

TIP

How long does it take to crack passwords with this technique?

Password Number of Words Time to Crack
abcdefg 7 character password 15 minutes to crack
abcdefgh 8 character password 30 minutes to crack
abcdefghi 2 word password 1 month
abcdefghijkl 8 word password 1 year

“abcdefg” 7 character password - .29 milliseconds to crack “abcdefgh” 8 character password - 5 hours to crack “abcdefghi” 9 character password - 5 days to crack “abcdefghijkl” 12 character password - 2 centuries to crack

WARNING

Even though the previous example shows that the password "abcdefghijkl" will take two centuries to crack, almost no attackers are going to use this technique to try to guess a password. Most attackers will use a combination of this technique, and the next two techniques to guess your password.

Brute force with dictionary word attacks

Dictionary attacks attempt to guess a password by brute forcing a password and substituting common dictionary words or patterns in place of letters. Instead of an attacker guessing a password by every combination of keys on a keyboard, they will try substituting words, common letter patterns (like ABCD, 1234, QUERTY QAZWSX, LKJHG), and common letter substitutions (@ for a, 8 for b, etc). This makes guessing a password happen exponentially faster.

TIP

How long does it take to crack passwords with this technique?

Password Number of Words Time to Crack
1springarbor! 2 word password 15 minutes to crack
#spring1arbor 2 word password 30 minutes to crack
C%ctu3GR0wsInArizon 2 word password 1 month
GO3anmAKEdis6!pl~sALLofw00rLD 8 word password 1 year

Notice the typos and errors in the bottom two passwords. Attackers would have a very hard time guessing these passwords because they can't substitute words in place of the letters.

Brute force with dictionary attacks that use password pastes.

Dictionary attacks with password pastes use old passwords from other websites that you used in the past that had a data breach. Once a site has a data breach it is safe to assume that attackers have any password or personal information that you used on the site, unless the site tells you other wise. The example below is a real example (with a fictitious name) that happened at SAU.

TIP

Example password paste from an incident at SAU:

  1. John Smith used his SAU email to sign up for LinkedIn
  2. His LinkedIn password was “SAUcougars!”
  3. LinkedIn had a data breach (2012) where this password was lost
  4. John Smith’s new password for the SAU portal is “#SAUcougars2018!”
  5. Hackers now know John’s SAU email address and an old password, it is much easier to guess his new password using a dictionary attack