Watch As Elite Password Hacking Software Cracks Thousands Of Passwords In Seconds

Dr. Mike Pound demonstrates how a password hacking hardware called “Beast” can make short work of your “strong” passwords.

Longish vid but scary.

  • Jay Currie

    Absolutely Nightmouse.

    The password side is one thing, the attachment of accounts is a whole other thing. We have a bank account which is used solely for online stuff. It does not attach to any other account or card. Which was a good thing because our PayPal acct was hacked and the hacker tried to transfer money to his acct. First he tried the PP balance – no go because there is rarely more than $20 in the PP account. Then he tried the prepaid card we have attached to the PP. No luck b/c we don’t keep a balance on that card. Then, amazingly, he tried pulling $800 bucks out of the bank account associated with the PP. Again denied because no money in the acct. We were alerted to the hack because the bank tried to charge us an NSF charge on the attempted withdrawal.

    The bank was great, PayPal was frustrating but it got straightened out. Basic takeaway, assume you are going to be hacked. Make sure you have any serious money well away from Amazon, PayPal etc.

  • Brett_McS

    This is Linux (Unix). If you watch carefully you can see that the command to list a file to the screen is “cat” (short for catenate). A former colleague would name his temporary text files “poo” so to type them out the command was …

  • Brett_McS

    Good video. This is scary. What about these systems that store your passwords for various sites and automatically supply them for logins? (rather than have to keep a list of passwords somewhere unsafe). I think google will do that. Are they OK?

  • Ironically in the old DOS systems you could use Extended ASCII — the complexity of the characters by using the extended (non-keyboard characters) would probably be at least xxxxxxx to the 256th power. A guy on the most powerful Unix in the world would never crack them. And if you add to that the extended keyboard drivers (for different language sets) it’s limitless — in fact you can design your own characters, essentially invent your own language.

    Back that was back with MS-DOS. There are few Windows-based/Internet servers with logons that recognize extended ASCII characters — the technology has actually bumped down for password security since the ’80’s!

    Example of extended (ASCII-II) characters to give an idea of the complexity that an extra 128 (non-keyboard) characters would add to passwords if the modern Internet were set up for it:

    ½ ╖ z £ å ª ┤ ║ ≈ █ Ä

  • DD_Austin

    Note the whole thing is based on a initial successful “hack” ie linklin
    which usually is an inside job

    they used to call it industrial espionage

    It’s bullshit like most hacking, it’s the easiest way to excuse thenselves when they
    screw up “we were hacked”, It’s like we were broken into inspite of all our locks,
    but we’re not telling about the new employee who took impressions of all our keys
    and knew the alarm codes.

    Do you pay your hydro bill by stuffing 7 20s a 5 and 57 cents into a envelope and mailing it?

    Don’t trust your money on the internet, don’t trust internet “companies”

  • Allan

    It would have been nice to here what he thought made up a good password. Give us a hint at least.