Is it possible to hack any password? | Real Bruteforce Experiment

  Рет қаралды 39,406

Sumsub

Sumsub

Күн бұрын

👾 Follow this link to know more protect yourself from fraudsters: sumsub.com/liveness/
In this experimental video, we’ll explore the possibility of hacking any password using bruteforce. You're gonna see a step-by-step breakdown of the process. We showcase the tools and techniques commonly used by hackers in order to show the vulnerabilities in password security.
You will find out about practical tips on creating strong, unique passwords and explore additional measures like two-factor authentication.
Don't miss out! Watch now and elevate your knowledge of password security.
#bruteforce #bruteforcing #hacking #sumsub #wifi
00:00 Time to hack a password
02:45 What is offline bruteforcing?
03:52 How can you be hacked?
04:42 What is a Hash?
06:24 Bruteforcing process
13:17 Verification Tool
14:02 Tips from Bruteforcing
16:32 The End
Sumsub - empowering compliance and anti-fraud teams to fight money laundering, terrorist financing, and online fraud.
More about us:
sumsub.com
/ sumsubcom
/ sumsubcom
/ admin

Пікірлер: 106
@Sumsubcom
@Sumsubcom 5 ай бұрын
Have you ever encountered password theft and what were the consequences? Tell the most interesting stories under this comment ;)
@bharathpofficial3719
@bharathpofficial3719 5 ай бұрын
Why aren't you using Arch Linux ? why Parrot or Kali ? is this because of Reachability ? edit: Basically why Debian ? [Don't just say, Why not ?]
@JoZaHandle
@JoZaHandle 5 ай бұрын
Can you do one on sim swapping?
@MStrong95
@MStrong95 5 ай бұрын
Insert the web comic about password cracking from XKCD and how something like a cheap tool from the hardware store might in some cases be enough "motivation" to get someone to tell you their password. I'm not trying to approve of using violence or doing anything criminal but more just the theory that there's sometimes more than one kind of brute force attack
@cv507
@cv507 5 ай бұрын
what about those röböttic? ´mözaic puzzles v??v after almost have a zentüree äfter bläde runäir you tell us you ´make ´securitti with phasyce ? ´är you outta yer eFFin mäinZ ^?^
@xila8861
@xila8861 4 ай бұрын
May you explain how people use bruteforce on emails and other accounts when it should lock the account after few tries ?
@blaxbrian6877
@blaxbrian6877 5 ай бұрын
kali has most of the tools youre using..... hash identifiers, hydra , john, mimikatz etc::::::: i think being security concious is the first step in staying safe while using computers
@dipperskrrt758
@dipperskrrt758 4 ай бұрын
love the way how you organise and show things in videos , excellent
@PeterM-eh5ji
@PeterM-eh5ji 5 ай бұрын
Amazing vid! Was not aware of how bad is my cyber security xD
@jaxjax2011
@jaxjax2011 4 ай бұрын
If you had a dataset of all the hashes of the password combinations you just described people using, would it not be faster to check a hash against this dataset than it is to re-hash every combination? If you had a 10TB storage unit, you could store about 4 billion hashes. You said that a graphics card could do about a million hashes a second, so 4 billion hashes would take about an hour on average to produce. If it takes 6 hours to go through all those common combinations, you'd just need 60TB of storage to have all of those combinations on hand. They would have to have an index to attach them to whatever password generates that hash in a different database. For 24 billion hashes (if that is our number) that would require an 11-bit or 2-byte index for each hash, which only increases the storage requirement by less than a terabyte. If your storage had a throughput of 3500 MB/s, then it would take you about 4.8 hours at most to find the correct hash, which is only 20% faster. Let's say you had the dataset of hashes divided among 10 computers, though, and you fed each of them the target hash. It would take less than half an hour to do the same work. If you had 100 computers, it would take less than 3 minutes. If you had a thousand computers, it would only take seconds. You could optimize the comparison with sorting algorithms as well. Only search the region of the dataset which matches the first byte of the hash and that'd speed it up by a factor of 256, which split among multiple computers could bring your time to crack down to milliseconds. Your server receives a hash, sends that hash to a farm that compares it to an optimized dataset of all common passwords, and returns the password near instantly.
@LifeExperimentalist
@LifeExperimentalist 4 ай бұрын
Bro calm down
@Avighna
@Avighna 4 ай бұрын
I was thinking something like this too, really the only explanation as to why this isn't being done is that it requires too much storage / maybe too much infrastructure
@mthia
@mthia 3 ай бұрын
@@Avighna the main reason is that salt and pepper exist in hashing
@LeoNux-um7tg
@LeoNux-um7tg 4 күн бұрын
if you're able to make those processors of separate computers work in parallel, it will be possible, but bruteforce isn't just word by word but combinations of previous symbols, letters and numbers. If you also meant to make the computers communicate through wireless or wired you're bound to the speed of that medium you are using, which is not noticeable until you make all those thousand of computers communicate on the same medium. This might work with the help of accelerators and make a program than utilize a simultaneous and heterogeneous computing.
@jaxjax2011
@jaxjax2011 4 күн бұрын
@@mthia This makes sense. Salt changes the whole hash including the first characters afaik.
@pravupritamlenka9215
@pravupritamlenka9215 5 ай бұрын
Ur videos are the real valueable video ❤️
@elmeromero303
@elmeromero303 4 ай бұрын
Never had issues with Bruteforce on my (own) Servers/Services. Just lock Accounts (or/and IP) Policy after 5 unsuccessfully attems. If you "allow" Brute Force.. its up to you.
@ewellynn122
@ewellynn122 5 ай бұрын
This video was helpful, at least now I can crack my own passwords if I forget them... And if I can't, that means that I've chosen really good passwords...
@karanskaushal
@karanskaushal 5 ай бұрын
Video quality and editing is amazing
@Sumsubcom
@Sumsubcom 5 ай бұрын
Thank you so much 😁
@MarioCheong-lu5hb
@MarioCheong-lu5hb 5 ай бұрын
What programming language will need to learn to do for security in data center? I’m interested in Kotlin, will it help?
@josephfredbill
@josephfredbill 10 күн бұрын
Great vid. Best Ive seen to explain this to non-techies. What isnt addressed 1. The computational complexity of muliple words in sequence (obfuscated with special chars) - a method many people (even geeks) use to remember the very few that must be remembered (hopefully one), 2. Combination of any method with bio-measurement (eg facial recognition, fingerprint recognition, iris recognition). How vulnerable is this if hashing is local to the device, 3. Apple’s new passkeys (sounds awfully like ssh to me).
@Sumsubcom
@Sumsubcom 8 күн бұрын
Great points! Happy to have you with us
@amansaiyed5909
@amansaiyed5909 5 ай бұрын
Sir, You cover the topics very well ❤ I have come to understand When will the next video come sir?❤ Il
@Sumsubcom
@Sumsubcom 5 ай бұрын
In a coupe of weeks! Thank you so much :)
@RealGlitchKing
@RealGlitchKing 5 ай бұрын
I saw the pwnagotchi video and was like "damn, instant sub"
@cluodalex2794
@cluodalex2794 5 ай бұрын
What is the distro you used? I wanted to download it please 🌹
@itsmedudecroc
@itsmedudecroc 5 ай бұрын
Love your videos ❤️
@Sumsubcom
@Sumsubcom 5 ай бұрын
Thanks!
@shhamza-zk8uj
@shhamza-zk8uj 5 ай бұрын
Which os your use ?
@TalesYeap
@TalesYeap 4 ай бұрын
What operation system are you using?
@ihateunicorns867
@ihateunicorns867 5 ай бұрын
You can't go wrong with _Password1_
@TalesYeap
@TalesYeap 4 ай бұрын
What os are you using?
@sbcinema
@sbcinema 5 ай бұрын
The big disadvantage of two-factor identification is that you need an internet connection, which wouldn't work with an air gap system
@wiezumteufel9024
@wiezumteufel9024 5 ай бұрын
What about a hardware based 2FA like a digital security key?
@JD2Q2Q
@JD2Q2Q 5 ай бұрын
​@@wiezumteufel9024you mean like a token based login?
@basspuppy133
@basspuppy133 4 ай бұрын
Hardware keys mate
@Pretended1168
@Pretended1168 3 ай бұрын
Luckily I changed my password after your short to the one you use in the video. Because It's super secure.
@surajpanditexe
@surajpanditexe 5 ай бұрын
Your videos made me a lot more privacy conscious 😅 thanks brother love from india 🇮🇳
@Sumsubcom
@Sumsubcom 5 ай бұрын
My pleasure 😊
@Zac_Cole
@Zac_Cole Ай бұрын
So you are telling me my 60 character random password is not going to get cracked so easily. I would have gone for a longer but the service had a character limit. Also since i didn't use a password generator or manager i store it in my primarily 256 bit encrypted server which could be a point of vulnerability, but if the hacker did so much work i would just give up.
@ClickClack_Bam
@ClickClack_Bam 5 ай бұрын
I have a Flipper Zero device. Amongst the many things it can do is there are brute force garage door attacks. If I know what make of garage door you have, I can load the brute force attacker & sit there as it runs through all of the possible combinations for the garage door remote until your garage door opens door me. Once I know where it opened your door I can program the device for that number & stop by & open your garage door any time I wish.
@Tass...
@Tass... 5 ай бұрын
This video isn't going to age well. Check back here in 10 years when a 128 year password using 1000 GPUs can be cracked in 10 days by a simple laptop.
@wiezumteufel9024
@wiezumteufel9024 5 ай бұрын
Until then we have geometric encryption as a standard. The Signal messenger already uses it so quantum computers cant crack their asymmetric encryption (which is even weaker than the symmetric encryption that is used in hard drives or password managers)
@Mango0fDoom
@Mango0fDoom 5 ай бұрын
You are not going to have hardware speed up by a factor of about 3 million in 10 years. Assuming Moore's law doubling every 2 years, you are off by a factor of 100,000. Impressive.
@pixlyana
@pixlyana 4 ай бұрын
u got new subs! 😍
@saileshrasaliya4721
@saileshrasaliya4721 5 ай бұрын
We do bruteforce in Android password but only 3-5 try after it's lock for 30 min how to bypass and try unlimited trys
@pandit-jee-bihar
@pandit-jee-bihar 5 ай бұрын
No mention of quantum computers in the video, quantum computers would shorten those years to hours and days. Luckily there's no quantum computer yet
@jakubp123
@jakubp123 5 ай бұрын
There already are, but they have too few qubits, aka they are not powerful enough yet
@wiezumteufel9024
@wiezumteufel9024 5 ай бұрын
Quantum computers are mostly a concern for asymmetric encryption (messenger apps) not necessarily that much for symmetric encryption (PW managers, hard drives). And there are also new encryption methods approved by NIST that withstand quantum computers (e.g. geometric encryption)
@xTerminatorAndy
@xTerminatorAndy 5 ай бұрын
how can you do 2fa on offline devices? e.g. your hard disk
@xTerminatorAndy
@xTerminatorAndy 5 ай бұрын
​@@carloareaserhow exactly do you add 2 factor on a hard disk? What I mean is protecting against the hard disk being taken out of your computer and attached to another. There is no 2fa for that
@Crazyanimefan340
@Crazyanimefan340 5 ай бұрын
please make a video of college server hacking🤔
@trueemperor3647
@trueemperor3647 5 ай бұрын
U will be in jail cuz that's LinkedIn with college fees
@fortunegaming4844
@fortunegaming4844 5 ай бұрын
Bro woke up and straight away choose violence 😂
@saphalpokhrel8982
@saphalpokhrel8982 5 ай бұрын
Relatable😂
@amalsuresh1203
@amalsuresh1203 4 ай бұрын
Even I have been also pondering about this for a long time ... 😂
@MohemedBilal-ub8kg
@MohemedBilal-ub8kg 3 ай бұрын
Yah iam trying these
@landolabrum
@landolabrum 4 ай бұрын
BRO, Please make your command prompts extend a few more keyframes on completion. damn, you say pause, but it’s next to impossible to screen shot them when you have some crazy transition play before I can screenshot the full output. thx bruh! love the video!!
@blogcorpo
@blogcorpo 2 ай бұрын
Great video! ♥
@Sumsubcom
@Sumsubcom 2 ай бұрын
Thank you!
@mvstermlnd
@mvstermlnd Ай бұрын
Good luck with my 300bit entropy passwords.
@maathejayandyjohns1343
@maathejayandyjohns1343 5 ай бұрын
Hi guys ,great channel, is it possible to recover wedding photos from a SD card, that has not been overwrite on.? Anyone can reply, thanks for any imput, just says , no history, SD card was put in then took out then put back in.
@skyboydenied4704
@skyboydenied4704 5 ай бұрын
I miss the old days f modern warfare 2 when it was just the boys and a a Xbox 360👾
@Mr.Eminem
@Mr.Eminem 4 ай бұрын
Technology will be better in future....for now brute force aint well...but with future tech and ai help... there'll be next level tech for cracking passwords
@Im-mortal
@Im-mortal 5 ай бұрын
is Proton Pass is Good for storing crypto wallet keys ???
@fickthissut
@fickthissut 5 ай бұрын
It's as good as Proton security. I'd recommend Keepass (offline password manager).
@njpme
@njpme 4 ай бұрын
Better create an encrypted vault then store it offline on multiple devices
@ocsrc
@ocsrc 5 ай бұрын
Brute force is used to break phones all the time. Usually takes 3 days for a basic 4 digit. A few weeks for 6 digit
@neb_setabed
@neb_setabed 5 ай бұрын
How do you deal with the phones auto wait period after x amount of failed tries
@username65585
@username65585 5 ай бұрын
@@neb_setabed Hackers find security bugs that allow that to be bypassed. Apple tries to find and fix these bugs. Then hackers try to find new bugs. It is a constant back and forth
@wiezumteufel9024
@wiezumteufel9024 5 ай бұрын
​@@neb_setabedthey circumvent it. Thats the reason why grapheneOS (most secure open source mobile operating system) is only put on Google Pixel devices. They have a special chip inside (Titan M2) that blocks multiple attempts and basically makes the phone unreadable if someone tries to remove it
@SaintIC
@SaintIC 4 ай бұрын
@@neb_setabedthere’s ways too disable them or actually turn them to an extremely high value
@Aman-cg2yt
@Aman-cg2yt 4 ай бұрын
Can you explain what is 'cicada 3301' And what if, if someone solve this puzzle then what he achievements
@kingvergaz
@kingvergaz 4 ай бұрын
Check their old videos they talked about it.
@basspuppy133
@basspuppy133 4 ай бұрын
They already talked about it and there's 50x other videos about the topic. It's already been done to death. There's more interesting things to talk about.
@ionamygdalon2263
@ionamygdalon2263 4 ай бұрын
Take a long phrase from the Bible and select an obscure language. This may be one of the hardest passwords to brute force.
@TheKnox159
@TheKnox159 5 ай бұрын
Which linux is he using? Looks similar to blackarch but im not sure. if anyone knows pls comment
@cluodalex2794
@cluodalex2794 5 ай бұрын
Ubuntu maybe
@tombrandis2866
@tombrandis2866 5 ай бұрын
I don't think you can tell with linux as its quite customisable- if you want it to look like that you can probably use any distro you want
@NateJGardner
@NateJGardner 3 ай бұрын
This video makes me want to make an enterprise honeypot
@Shadow_zenin
@Shadow_zenin 5 ай бұрын
ty tip
@username65585
@username65585 5 ай бұрын
Any password can be cracked with a wrench attack.
@electrowizard2658
@electrowizard2658 5 ай бұрын
hahahah
@t0maz.m
@t0maz.m 5 ай бұрын
Why are there 1.8M like son 5k views?
@tymurkr
@tymurkr Ай бұрын
but in the end, the password “1111” is still the most secure, because Bruteforce does not check this combination
@Zac_Cole
@Zac_Cole Ай бұрын
What do you mean
@kucingBermisai
@kucingBermisai 5 ай бұрын
15627
@geroffmilan3328
@geroffmilan3328 4 ай бұрын
I crimged pretty hard when you said authentifucation 😂 It's *authentication* - no "if" in there. And offline attacks against whole-disk encryption are a lot harder if the encryption key is in the computer's Trusted Platform Module rather than on-disk. Having it on-disk is like hiding your front door key under the door mat.
@vinnypistone.
@vinnypistone. 5 ай бұрын
Let's put 10 ads in a 16 min video what a classic.. you clowns
@ImARealHumanPerson
@ImARealHumanPerson 5 ай бұрын
It's December. The payouts are 🤌 You'll see a lot of ads this month.
@bharathpofficial3719
@bharathpofficial3719 5 ай бұрын
what bro is using chrome with "Add extra ads" extension ?
@vinnypistone.
@vinnypistone. 5 ай бұрын
Bro I'm just using the youtube app? Wtf is chrome ?
@bharathpofficial3719
@bharathpofficial3719 5 ай бұрын
@@vinnypistone. now see who is clown!!
@ImARealHumanPerson
@ImARealHumanPerson 5 ай бұрын
​@@vinnypistone.Use Revanced
We hired a real hacker to hack our email | Real Experiment
15:38
白天使和小丑帮助黑天使。#天使 #超人不会飞 #超人夫妇
00:42
ФОКУС С ЧИПСАМИ (секрет)
00:44
Masomka
Рет қаралды 4,3 МЛН
Não pode Comprar Tudo 5
00:29
DUDU e CAROL
Рет қаралды 83 МЛН
Hacking Through the Air | Contactless Payments and NFC
24:14
Hacking Complex Passwords with Rules & Munging
16:55
John Hammond
Рет қаралды 92 М.
Python The Hacker's Secret Weapon | Importance Of Python in Hacking
11:06
We explored real DIY Pineapple WiFi device
15:06
Sumsub
Рет қаралды 104 М.
How to Get Someone's Password
17:53
Jack Rhysider
Рет қаралды 706 М.
17 Hacker Tools in 7 Minutes - ALL Hak5 Gear
6:54
Hak5
Рет қаралды 354 М.
How Hackers Hack CCTV Cameras
15:00
zSecurity
Рет қаралды 663 М.
Detect Hackers & Malware on your Computer (literally for free)
16:38
I legally defaced this website.
25:48
thehackerish
Рет қаралды 446 М.
Start from 0 at any point on the T1 Digital Tape Measure
0:14
REEKON Tools
Рет қаралды 30 МЛН
Samsung or iPhone
0:19
rishton_vines😇
Рет қаралды 2,1 МЛН
Как открыть дверь в Jaecoo J8? Удобно?🤔😊
0:27
Суворкин Сергей
Рет қаралды 1 МЛН
All New Atlas | Boston Dynamics
0:40
Boston Dynamics
Рет қаралды 5 МЛН