top of page
Search

Dashlane Cracked: The Risks of Using a Compromised Password Manager

  • vadimgrishin649
  • Aug 11, 2023
  • 3 min read


In tests, researchers say they cracked all complex patterns in the first attempt, except one. Further, they also cracked 87.5% of all medium complexity patterns in the first try, and 60% of the easy patterns.


All passwords can be cracked using brute force tactics given sufficient time, which is why they need to be complex. A password of 6 characters regardless of the digits, letters and symbols it contains can be cracked almost instantly using the latest GPUs. Even a complex password of 8 characters presents little problem, taking less than 40 minutes to crack. This is why the recommended minimum length for passwords is 12 characters. Passwords should also not contain dictionary words, as it makes them much easier to crack.




Dashlane Cracked




The issue @KJIsaacson is how strong was your Master Password in your LastPass vault - was it high entropy (i.e. random to some degree - the more the better) and long...? If not then there is a fair chance your particular vault may get cracked eventually - whether that's already happened or might happen in 3, 9, 19 months is hard to say... BUT that is only if yours is one of the ones lost - it might not be and you may have nothing to worry about.


If passwords aren't random enough then something that should take 3 years in the table below might be crackable in 2 minutes or less. The table shows the maximum time in the best case scenario favouring you - in the worst case favouring the bad actor you get cracked instantly or in a few seconds.


Hey @VerboortTech - yes I noticed the lack of iterations clarity too. Umm, yes you are right I believe the one I posted is a 2022 one, BUT it's the one with (obsolete?) MD5 hashes cracked by an RTX 3090 GPU (versus the older RTX 2080 GPU in the 2020 test). As opposed to the one you posted which is the more relevant (modern) PBKDF2 hash function cracked using the RTX 3090 GPU. Oops. My bad. ?


LiveAuctioneers, an online antiques marketplace, has revealed that it suffered a data breach that security researchers have claimed includes the personal data and cracked passwords of millions of users.


In a blog post, cybersecurity firm CloudSEK said it had found a post on a cybercrime marketplace, dated 10 July, advertising the information of 3.4 million LiveAuctioneers users, as well as three million cracked username and password combinations.


I wrote about this same thing back in 2007. The news in 2013, such as it is, is that this kind of thing is getting easier faster than people think. Pretty much anything that can be remembered can be cracked.


How likely is this kind of password creation tool likely to be cracked (the string of letters or odd characters) compared to other tools. I can easily remember 9 parentheses, fourteen @ signs, and on and on, in various combinations. Does duplicating a character make it easier to crack the password?


I thought password managers have the purpose that I only have to remember one master password and it stores all the other for me securely. This allows them to be long and random and hard to guess and so on and so forth. Great, except that it doesn't really work like that in practice, because dashlane requires verification whenever I use my master password on a new device.


To solve this, I have to have a human rememberable password for my e-mail. As it appears to be a bad idea in general to re-use a password for different places, this password should be distinct from my dashlane master password. But that in turn weakens the purpose of the password manager.


Private information is stored behind a password. Having a strong password is important. Creating a longer and varied password will make it more difficult to guess or crack. Keep in mind, a ten digit all lowercase password can be cracked in a day. A ten digit lowercase, uppercase, and number password takes 49 days to crack. A ten digit lowercase, uppercase, number, and symbol password takes 2,801 days to crack.


If all a company's passwords are cracked at once, it's usually because a password file was stolen. Some companies have lists of plain-text passwords, while security-conscious enterprises generally keep their password files in hashed form. Hashed files are used to protect passwords for domain controllers, enterprise authentication platforms like LDAP and Active Directory, and many other systems, says Brian Contos, CISO at Verodin, Inc. 2ff7e9595c


 
 
 

Recent Posts

See All

Comments


© 2023 by JACK BANKS PHOTOGRAPHY. Proudly created with Wix.com

  • Twitter Clean
  • Flickr Clean
bottom of page