Table of Contents:
Unlocking the Unbreakable: Turn Your Name and Birthdate into a Password Fortress!
Hello everyone, in today's article our 8th technical article I will be exploring how you can create a password from your name and birthdate that would take 300 quadrillion years to be broken using great computing power. Sit down, relax, and let's dive into this article.
Flip the Script: Mastering the Art of Remembering Criteria, Not Passwords!
In this article, I'll shift the mindset from remembering the password to remembering the criteria or methodology used to create it. We'll come up with a draft name not just your name and a date not just your birthday. It can be something like your pet's name combined with the date you first visited Paris. Using this criteria, we will create a strong password.
Unlocking the Secrets of Password Cracking: Brace Yourself for the Cyberstorm!
Password strength checkers often consider the likelihood of cracking or brute-forcing a password. They simulate various attack methods, such as brute force attacks, which attempt all possible combinations of characters until the correct one is found. They also employ dictionary attacks, which use a predefined list of words and common variations to guess passwords. Additionally, they compare the password against a database of commonly used passwords to determine its strength. By assessing these factors, password strength checkers can provide an accurate evaluation of how secure a password is.
Crafting a Vault-Worthy Password: It's an Art and Science!
In crafting a secure password, I utilized a mix of characters, symbols, and numbers for each component. Based on the recommendations from this website
Security.org How Secure Is My Password? | Password Strength Checker, I selected the optimal placement for each type of component. Check the table below to see the breakdown:
Name | 1st | 2st | 3st | 4st | 5st | 6st | 7st | 8st |
|---|---|---|---|---|---|---|---|---|
Numbers | 2 hundred picoseconds | 32 nanoseconds |
| 1 hundred microseconds | 67 milliseconds |
| 6 minutes | 8 hours |
Symbols | 3 hundred picoseconds |
| 1 microsecond | 1 hundred microseconds |
| 5 seconds | 6 minutes |
|
Characters |
| 16 nanoseconds | 1 microsecond |
| 67 milliseconds | 5 seconds |
| 8 hours |
As we see in the table above, the selection of Numbers, Symbols, and Characters was based on the most complex time to break.
In the first component, I selected the character because it takes more time to be cracked. Then, in the second section, I combined the first section character with three combinations: character-character, character-symbol, or character-number. I then selected the character-symbol combination based on the highest complexity, and so on.
Prime Time Passwords: The Ideal Moment Based on Compatibility!
By following this approach, we ensure that each position in the password is chosen to maximize its strength and complexity, making it more secure against potential attacks, checking the underline table will show us each character length and the maximum time to crack based on the upper combination, with transformation to milliseconds.
Top Picks: The Most Impressive 8-Character Password Ever!
We can create a password using the following pattern: character, symbol, number, character, symbol, number, and then character, symbol, check the underline password that is based on this rule:
I asked ChatGPT to create a highly complex 8-character password, and the result was: G$3p!X8@ and 9f$Yj^2W. Both of them would take 8 hours to crack.
But what if I just duplicated the second part, making the passwords G$3p!X8@G$3p!X8@ or 9f$Yj^2W9f$Yj^2W?
That would extend the time to crack the passwords to one trillion years, as shown in the table below. This is because I followed the same approach as the previous rule, but increased the length from 8 characters to 16 characters.
Double Trouble: The Quest for the Ultimate 16-Character Password!
Name | 9st | 10st | 11st | 12st | 13st | 14st | 15st | 16st |
|---|---|---|---|---|---|---|---|---|
Numbers → Symbols → Characters | 3 weeks | 5 years | 4 hundred years | 34 thousand years | 2 million years | 2 hundred million years | 15 billion years | 1 trillion years |
Now, let's fill in all 16 characters in a table and get an overview of the relationship between numbers, characters, and their crack time.
Password Length | Time to Crack |
|---|---|
1 | 0.0000006 |
2 | 0.000042 |
3 | 0.003 |
4 | 0.8 |
5 | 67 |
6 | 5000 |
7 | 360000 |
8 | 28,800,000 |
9 | 1814400000 |
10 | 157,788,000,000 |
11 | 12,631,040,000,000 |
12 | 1,072,954,400,000,000 |
13 | 63,115,200,000,000,000 |
14 | 6,311,520,000,000,000,000 |
15 | 473,364,000,000,000,000,000 |
16 | 31,557,600,000,000,000,000,000 |
Space Adventures: Supercharging Your Password with Spaces!
- If we add a space character at the end or between the two words of the upper password
a@3A&7g) a@3A&7g)or asa@3A&7g)a@3A&7g), the strength increases dramatically to 3 quadrillion years. - Adding
2spaces extends the strength to3 hundred quadrillion years. - Adding
3spaces further boosts the strength to36 quintillion years.
The Perfect Balance: Memorable Yet Impenetrable Passwords!
- The key is to create a password that is easy to remember but hard to crack.
- Use this order:
Characters, Symbols, Numbers, Characters, Symbols, Numbers, Characters, SymbolsthenCharacters, Symbols, Numbers, Characters, Symbols, Numbers, Characters, Symbolsthenspace.
Password Alchemy: Transforming Marlon into a Master Key!
- Let’s start with the
firstpart and duplicate it for thesecond part. - For example, use the number of his birth,
17. - A normal user might create
Marlon17, which takes about1 hour to crack. - Instead, we can use the same character to make a stronger password by following this order: Characters, Symbols, Numbers, Characters, Symbols, Numbers, Space.
- Steps to Create the Password:
- Start with the character
MfromMarlon. - Use the symbol
@froma. - Use the number
1from17. - Repeat and use the character
rasR. - Use the symbol
!from1. - Use the number
7from17. - So far, we have
m@1R!7. - Add
ofromMarlon. - Add a special character
#as the last part of the first password section. - The final first part is
m@1R!7o#. - The final password will be:
m@1R!7o#m@1R!7o#.
Memory Magic: Effortlessly Retaining Your Password Strategy!
- To remember the password, just recall the criteria: Characters, Symbols, Numbers, Characters, Symbols, Numbers, Characters, Symbols, space
(CSN CSN CS)*2 + Spaceor we can have(CSN CSN CS) + Space + (CSN CSN CS)
The Ultimate OSINT Password Heist: Outsmarting Hackers with Your Unique Methodology
Consider if all readers of this article create their passwords based on the guidelines provided. An attacker could examine my LinkedIn posts, check comments from people willing to try it, and gather information through OSINT (Open-Source Intelligence) about their pets, parents' names, and significant dates like certifications, work experience, and graduations. Using this information, the attacker could create a dictionary of passwords and attempt to access accounts like Gmail and LinkedIn, especially if Multi-Factor Authentication (MFA) is not enabled.
My response is that you should develop your own unique methodology for creating passwords that only you know. For instance, while writing this at 2:40 PM, I thought of a method: take the first three letters of the website you're registering on, then add @, followed by your name in reverse, then #, and any given number like 78. So, for Snapchat, the password would be sna@emos#78. Adding a space at the end would make it even more secure, potentially taking 10,000 years to crack. Creating a personal rule or methodology for password creation is a great idea, rather than trying to remember each one individually
DM Me !
Heyyy! If you have any questions or updates to change this article, please send me a DM on LinkedIn. Peace! linkedin.com