Table of Contents:
Unlocking the Unbreakable: Turn Your Name and Birthdate into a Password Fortress!
Hello everyone, in today's article our 8th
technical article I will be exploring how you can create a password from your name
and birthdate
that would take 300 quadrillion years
to be broken using great computing power. Sit down, relax, and let's dive into this article.
Flip the Script: Mastering the Art of Remembering Criteria, Not Passwords!
In this article, I'll shift the mindset from remembering the password to remembering the criteria or methodology used to create it. We'll come up with a draft name not just your name and a date not just your birthday. It can be something like your pet's name
combined with the date you first visited Paris
. Using this criteria, we will create a strong password.
Unlocking the Secrets of Password Cracking: Brace Yourself for the Cyberstorm
!
Password strength checkers often consider the likelihood of cracking
or brute-forcing a password
. They simulate various attack methods, such as brute force attacks
, which attempt all possible combinations of characters until the correct one is found. They also employ dictionary attacks
, which use a predefined list of words
and common variations to guess passwords
. Additionally, they compare the password against a database of commonly used passwords to determine its strength
. By assessing these factors, password strength checkers can provide an accurate evaluation
of how secure a password is.
Crafting a Vault-Worthy Password: It's an Art and Science!
In crafting a secure password, I utilized a mix
of characters
, symbols
, and numbers
for each component. Based on the recommendations from this website Security.org How Secure Is My Password? | Password Strength Checker, I selected the
optimal placement
for each type of component. Check the table below to see the breakdown:
Name | 1st | 2st | 3st | 4st | 5st | 6st | 7st | 8st |
---|---|---|---|---|---|---|---|---|
2 hundred picoseconds | 32 nanoseconds |
| 1 hundred microseconds | 67 milliseconds |
| 6 minutes | 8 hours | |
3 hundred picoseconds |
| 1 microsecond | 1 hundred microseconds |
| 5 seconds | 6 minutes |
| |
| 16 nanoseconds | 1 microsecond |
| 67 milliseconds | 5 seconds |
| 8 hours |
As we see in the table above, the selection of Numbers
, Symbols
, and Characters
was based on the most complex time to break.
In the first
component, I selected the character because it takes more time to be cracked. Then, in the second section, I combined the first section character with three combinations
: character-character
, character-symbol
, or character-number
. I then selected the character-symbol combination based on the highest complexity
, and so on.
Prime Time Passwords: The Ideal Moment Based on Compatibility!
By following this approach, we ensure that each position in the password is chosen to maximize its strength and complexity, making it more secure against potential attacks
, checking the underline table will show us each character length and the maximum time to crack based on the upper combination, with transformation to milliseconds
.
Top Picks: The Most Impressive 8-Character Password Ever!
We can create a password using the following pattern: character, symbol, number, character, symbol, number, and then character, symbol
, check the underline password that is based on this rule:
Name | 1st | 2st | 3st | 4st | 5st | 6st | 7st | 8st |
---|---|---|---|---|---|---|---|---|
a | @ | 3 | A | & | 7 | g | ) |
I asked ChatGPT
to create a highly complex 8-character password, and the result was: G$3p!X8@
and 9f$Yj^2W
. Both of them would take 8 hours to crack.
But what if I just duplicated the second part, making the passwords G$3p!X8@G$3p!X8@
or 9f$Yj^2W9f$Yj^2W
?
That would extend the time to crack the passwords to one trillion years
, as shown in the table below. This is because I followed the same approach as the previous rule, but increased the length from 8 characters to 16 characters.
Double Trouble: The Quest for the Ultimate 16-Character Password!
Name | 9st | 10st | 11st | 12st | 13st | 14st | 15st | 16st |
---|---|---|---|---|---|---|---|---|
3 weeks | 5 years | 4 hundred years | 34 thousand years | 2 million years | 2 hundred million years | 15 billion years | 1 trillion years |
Now, let's fill in all 16 characters in a table and get an overview of the relationship between numbers, characters, and their crack time.
Space Adventures: Supercharging Your Password with Spaces!
- If we add a space character at the end or between the two words of the upper password
a@3A&7g) a@3A&7g)
or asa@3A&7g)a@3A&7g)
, the strength increases dramatically to 3 quadrillion years. - Adding
2
spaces extends the strength to3 hundred quadrillion years.
- Adding
3
spaces further boosts the strength to36 quintillion years.
The Perfect Balance: Memorable Yet Impenetrable Passwords!
- The key is to create a password that is easy to remember but hard to crack.
- Use this order:
Characters, Symbols, Numbers, Characters, Symbols, Numbers, Characters, Symbols
thenCharacters, Symbols, Numbers, Characters, Symbols, Numbers, Characters, Symbols
thenspace
.
Password Alchemy: Transforming Marlon
into a Master Key!
- Let’s start with the
first
part and duplicate it for thesecond part.
- For example, use the number of his birth,
17
. - A normal user might create
Marlon17
, which takes about1 hour to crack.
- Instead, we can use the same character to make a stronger password by following this order: Characters, Symbols, Numbers, Characters, Symbols, Numbers, Space.
- Steps to Create the Password:
- Start with the character
M
fromMarlon
. - Use the symbol
@
froma
. - Use the number
1
from17
. - Repeat and use the character
r
asR
. - Use the symbol
!
from1
. - Use the number
7
from17
. - So far, we have
m@1R!7
. - Add
o
fromMarlon
. - Add a special character
#
as the last part of the first password section. - The final first part is
m@1R!7o#
. - The final password will be:
m@1R!7o#m@1R!7o#
.
Memory Magic: Effortlessly Retaining Your Password Strategy!
- To remember the password, just recall the criteria: Characters, Symbols, Numbers, Characters, Symbols, Numbers, Characters, Symbols, space
(CSN CSN CS)*2 + Space
or we can have(CSN CSN CS) + Space + (CSN CSN CS)
The Ultimate OSINT Password Heist: Outsmarting Hackers with Your Unique Methodology
Consider if all readers of this article create their passwords based on the guidelines provided
. An attacker could examine my LinkedIn posts
, check comments from people willing to try it
, and gather information through OSINT
(Open-Source Intelligence) about their pets
, parents
' names
, and significant dates like certifications
, work experience
, and graduations
. Using this information, the attacker could create a dictionary of passwords
and attempt to access accounts like Gmail
and LinkedIn
, especially if Multi-Factor Authentication (MFA)
is not enabled
.
My response is that you should develop your own unique methodology for creating passwords that only you know. For instance, while writing this at 2:40 PM
, I thought of a method: take the first three letters
of the website you're registering on, then add @
, followed by your name in reverse
, then #
, and any given number like 78
. So, for Snapchat
, the password would be sna@emos#78
. Adding a space
at the end would make it even more secure, potentially taking 10,000 years to crack
. Creating a personal rule or methodology for password creation is a great idea, rather than trying to remember each one individually
DM Me !
Heyyy
! If you have any questions or updates to change this article, please send me a DM on LinkedIn. Peace! linkedin.com