Discussion in 'Motherboards & Memory' started by vawrvawerawe, Nov 13, 2012.
THE MATH I PROMISED:
= 94 possible characters each
94^64 = 1,906,262,174,603,609,240,179,178,656,657,625,086,945,986,037,788,719,949,935,941,357,851,066,322,596,406,102,384,587,670,757,587,004,664,979,877,271,875,661,328,285,696
1906262174603609240179178656657625086945986037788719949935941357851066322596406102384587670757587004664979877271875661328285696[possible combinations]/2800000000[number of passwords per second for one PC using software]
seconds in one year: 31,556,926 (rounded up from 31,556,925.9936)
How many years would it take for one PC to crack a 64 character password (ONLY using the symbols on a keyboard, not counting other symbols), using commercial-grade top-of-the-line software on a single home PC (BARE PASSWORD, NOT INCLUDING WPA2 ALGORITHM)?
Answer: 680807919501289014349706663092008959623566442067399982119979056375380829498716465137352739556281073094635670454241307[seconds to crack]/31556925.9936[seconds in one year] =
THERE IS NOT A NAME FOR A NUMBER THAT LARGE!!! THE HIGHEST THE NUMERICAL SYSTEM GOES IS THE GOOGOL (where Google got its name). THE GOOGOL HAS 100 ZEROS AFTER IT. THIS NUMBER IS 21.5 x 10^108 - that is, 109 ZEROS AFTER 21 (36 SETS OF THREE). So let's just say it like this: It would take 21,573,961,91 GOOGOL YEARS to crack the password.
PERSPECTIVE: The universe will cease to exist (big crunch) in 100 billion years.
So, 21573961913760600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000[YEARS TO CRACK IT]/114000000000[time from big bang to big crunch]=
189,245,279,945,268,421,052,631,578,947,368,421,052,631,578,947,368,421,052,631,578,947,368,421,052,631,578,947,368,421,052,631,578 TIMES FOR THE UNIVERSE TO EXPAND AND COLLAPSE BEFORE YOU COULD CRACK THE PASSWORD.
In other words, 1.8924528 x 10^98, in lamen terms:
IT WOULD TAKE ALMOST 19 MILLION GOOGOL (19 with 106 zeros after it) TIMES FOR THE UNIVERSE TO GO FROM THE BIG BANG TO THE BIG CRUNCH, IN ORDER TO CRACK THE PASSWORD!!!
AND THAT'S ***BEFORE*** WE HAD ANY KIND OF ALGORITHM LIKE WPA2!!!
Unfortunately this would actually even be possible because the proposed HEAT DEATH OF THE UNIVERSE will be in 10^150 years from now.
NOW, let's calculate what it would be WITH WPA2:
WPA2 uses a military-grade 256-bit algorithm that uses a logarithmic scale. If you use the standard ASCII characters, then that leaves you with 94 possibilites for each of 64 characters.
In short, the same as the SSID and password themselves, since I used 32 characters each.
Thus, the solution is quite easy without delving into much math (we're not even going to delve into the other factors of WPA2 that would multiply this solution exponentially. the number would be so outrageously large it would be completely pointless to even write:
(94^64)[SSID+Password]^[To the POWER OF](94^64)[WPA2]
In short, (94^64)^(94^64)
As we know from before, this is 1,906,262,174,603,609,240,179,178,656,657,625,086,945,986,037,788,719,949,935,941,357,851,066,322,596,406,102,384,587,670,757,587,004,664,979,877,271,875,661,328,285,696 ^
SORRY, I HAD TO STOP. THE BIG NUMBER CALCULATOR GAVE ME AN ERROR, "SORRY, WE CAN'T CALCULATE NUMBERS THAT BIG!!!"
(Apparently even trying to calculate this would make such an outrageously large number that it would be completely pointless to even write))
I tried it in Google too but Google basically said "I'm not going to even touch that."
Now you see why you would have to be retarded to think you could crack it.
What's more retarded is how I only need one sentence to say that you're ignorant for thinking that brute force is the only way to compromise a network.
Edit: You're also pissing people off, so no one is really going to care at this point. It might have something to do with you posting a million times a day and now for being aggressive and ignorant.
Sure there are other ways besides brute force. You could kidnap them and torture them. You could break into their house and steal their router and computer and search for it. You could hire a Russian spy to get it in whatever way possible including espionage.
But here we are talking about CRACKING A PASSWORD. Specifically.
Please read before posting. Thanks.
p.s. don't post stupid stuff like posting a million times per day. I think I posted like 10 times today, 10 times yesterday, 20 times the day before. only day I posted more was on day one.
Sometimes you don't need to "crack" the password to obtain it. Man in the middle attacks tend to work well if you want to sniff the packets between the AP and the wireless client.
150 posts in a day! LOL!
Truly a Guinness world record
True. As you saw from the math, without other ways like man in the middle and packet sniffing and other things which I prefer not to learn about, then it would be literally impossible to gain access to many people's networks.
lol yeah, day one was like 150 posts!! lol but seriously it was necessary in order to gather the information to build the PC.
I suggest you read up on "ways to crack a wireless netowrk" as you clearly think that there is only one way. And no, we're not talking about kidnapping anyone. You're ignorance and failure to listen has ensured that people aren't going to help you - unless you stop believing this crap you have in your head.
Instead of listening to the people who clearly know more than you, you're pulling numbers from web-sites and calculators. You do realise some people here have cracked many-a network in their time (I know of at least 2 TPU members that are VERY well versed in it); but they're not going to show themselves. And why should they? You'll probably accuse them of being retarded too.
Stop saying impossible, there is no such thing.
But those ways do exists and they're not going anywhere. That is the point. If you truly want a secure network, don't use wireless. It is as simple as that. In all honestly, I doubt you have anything interesting enough for someone to actually want to go through the hassle of cracking your wireless specifically. So this entire thread is practically moot. Not just in the sense that it doesn't really matter but that half of what you (and other people,) are saying is just wrong.
Just throwing that out there. Good day.
+1: Thank you.
no, you're right, there are many ways besides cracking the password (brute force). Never said there wasn't.
There is definitely such thing as "impossible". You must open your mind to be able to see such things. I believe you are smart enough to conceive it. Don't be like the people who accept whatever they hear instead of using their own mind to make logical deductions about the state of reality.
Breathe in space (on your own)
turn invisible (on your own)
and of course those which are logical impossibilities:
At this point, this guy is obviously trolling.
Why he continues to gain attention and trolololololololololol you guys is shocking..... the thread title has got its answer (within the first 5 posts) and this is massive derailment meant to boost his ego/epeen while he argues with you for THE LULS....
Any normal thread would of been left to rot by now as the OP has clearly got his question answered and is taking your time away from more deserving people that need help and arent just fishing.
Not much to see here... others need assistance.... :shadedshu
Like you are doing now? You don't know enough about the reality of networks to make logical decuctions about it. Also, wtf are you talking about?
I love when people makes sense.
Were are you getting that number?
The rest of this "math" is null and void until you answer the above.
60.5 GiB of memory
35 EC2 Compute Units (16 virtual cores*)
2 SSD-based volumes each with 1024 GB of instance storage
I/O Performance: Very High (10 Gigabit Ethernet)
Storage I/O Performance: Very High**
EBS-Optimized Available: No***
API name: hi1.4xlarge
Is only capable of 400,000 passwords a second using a very well written code base. That being said you can add multiple clients to the master node. At 28 cents per minute per node...As you can see you 64 character password on its own would be quite secure. Working out to 4 786 862 537 825 394 916 592 534 983 496 028 527 291 883 841 218 214 647 864 290 081 488 615 122 262 999 558 708 938 007 582 012 642 746 662 068 785 849 625 697 324 435 096 302 375 231 559 404 174 825 844 years using 1000 nodes of Amazon's EC2 with perfect 100% scaling (impossible). That being said there is also a chance the first password it generates is the correct one immensely improbable, but possible.
On the other side of the fence WPA2-PSK is not 100% secure and has vulnerabilities. Some have been mentioned to you, but you are acting a little over-encompassing when they are brought up to. One of them being a "hidden" SSID is and always will be broadcast within packets between connected computers and the network. Playing the man in the middle game your SSID is not hidden. If you are not paying attention when you get the reconnect you would probably just enter the password thinking the network bumped you. Giving your password to said hacker. Honestly if I didn't like you I wouldn't bother getting on your network a simple Network Injection would bring your "secure" WAP2-PSK network down next to instantly.
Doesn't matter how fast your computer is. It matters the limitations of the software unless your computer is not powerful enough to access the full features of the software, in which case it would be even slower.
Do motherboards have wireless? Yes.
A simple google of "Motherboard wifi/wireless" would of given an answer.
Answer given, thread closed.
Separate names with a comma.