all 1 comments

[–]SoCo 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

I've recently dug into trying to crack an encrypted LUKs partition on a hard drive, which I upgrade or changed the password to and got locked out of years ago. Upset for losing data not backed up, I threw the drive on a shelf and bought a new one...years later picking it up to try to crack. Learning to use the various cracking tools and using my higher powered computer, exposed how easy it is to brute force almost anything.

I learned that for LUKs, a 20 character password is required to be half way secure from brute forcing. Anything that allows dictionary assisted cracking demotes the value of all your extra password characters. Using the dumb 133t speak p@$$w0rd letter transposing tricks add almost nothing to your password complexity, as trying those kiddy tricks is already a feature of cracking programs, despite that being taught as the go-to "good password" trick for the last 15 years in overpriced universities.