Comments on: This Week in Security: Password Sanity, Tank Hacking, And The Mystery 9.9 https://hackaday.com/2024/09/27/this-week-in-security-password-sanity-tank-hacking-and-the-mystery-9-9/ Fresh hacks every day Sun, 29 Sep 2024 20:11:26 +0000 hourly 1 https://wordpress.org/?v=6.6.2 By: The Commenter Formerly Known As Ren https://hackaday.com/2024/09/27/this-week-in-security-password-sanity-tank-hacking-and-the-mystery-9-9/#comment-8045282 Sun, 29 Sep 2024 20:11:26 +0000 https://hackaday.com/?p=724559&preview=true&preview_id=724559#comment-8045282 In reply to Miles.

Correct!

]]>
By: 0xdeadbeef https://hackaday.com/2024/09/27/this-week-in-security-password-sanity-tank-hacking-and-the-mystery-9-9/#comment-8045277 Sun, 29 Sep 2024 19:42:29 +0000 https://hackaday.com/?p=724559&preview=true&preview_id=724559#comment-8045277

And finally, the Kia dealer and owners websites leak a bit too much data.

Given that Kia and Hyundai collaborate on a number of platforms, that makes me wonder if Hyundai might be prone to a similar vulnerability.

]]>
By: Miles https://hackaday.com/2024/09/27/this-week-in-security-password-sanity-tank-hacking-and-the-mystery-9-9/#comment-8045091 Sun, 29 Sep 2024 04:44:52 +0000 https://hackaday.com/?p=724559&preview=true&preview_id=724559#comment-8045091 What happened to batteryhorsestaple?

]]>
By: Miles https://hackaday.com/2024/09/27/this-week-in-security-password-sanity-tank-hacking-and-the-mystery-9-9/#comment-8045089 Sun, 29 Sep 2024 04:42:47 +0000 https://hackaday.com/?p=724559&preview=true&preview_id=724559#comment-8045089 In reply to rclark.

But does it need to run non-stop? or only for a few seconds when you press the “find printers” button?

]]>
By: Ewald https://hackaday.com/2024/09/27/this-week-in-security-password-sanity-tank-hacking-and-the-mystery-9-9/#comment-8044801 Sat, 28 Sep 2024 09:48:11 +0000 https://hackaday.com/?p=724559&preview=true&preview_id=724559#comment-8044801 In reply to Christian.

Security questions to reset a password are a very bad idea in general. There is plenty of evidence that this information (the answer) can be obtained way to easily. The underlying problem is that the information is not considered a secret by the user.
Also passwords with a length of 8 characters are just way to weak. They can be cracked in a femtosecond, they are more susceptible to shouldersurfing and guessing. Passwords sentences of ate least 15 characters are the way forward as long as we have to use passwords. And for not having to change your password periodically, it’s essential to have some sort of professional breach monitoring set up. Home computers/smartphones are still compromised a lot and passwords are harvested.

]]>
By: Jonathan Bennett https://hackaday.com/2024/09/27/this-week-in-security-password-sanity-tank-hacking-and-the-mystery-9-9/#comment-8044739 Sat, 28 Sep 2024 02:10:33 +0000 https://hackaday.com/?p=724559&preview=true&preview_id=724559#comment-8044739 In reply to mike stone.

It didn’t make it into the article, but I was thinking about this. You can expose passwordless telnet to the Internet. You can set your password to “password” and expose SSH to the Internet. At some point the user has to take responsibility for not using insecure settings on their machine.

]]>
By: LordNothing https://hackaday.com/2024/09/27/this-week-in-security-password-sanity-tank-hacking-and-the-mystery-9-9/#comment-8044618 Fri, 27 Sep 2024 19:46:41 +0000 https://hackaday.com/?p=724559&preview=true&preview_id=724559#comment-8044618 In reply to Christian.

yea im not going to miss those. tired of digging up my brutal past every time a password system screws up.

also enforced password requirements. just show users their password strength and dont tell them how to be. use of emojis in passwords not only ups the entropy by a factor of four, but also allows a personalized lexicon and grammar which is immune to dictionary attacks. they also stand to be easy to remember. i for one will continue to use random hashes.

]]>