From Friday, April 19th (11:00 PM CDT) through Saturday, April 20th (2:00 PM CDT), 2024, ni.com will undergo system upgrades that may result in temporary service interruption.
We appreciate your patience as we improve our online experience.
From Friday, April 19th (11:00 PM CDT) through Saturday, April 20th (2:00 PM CDT), 2024, ni.com will undergo system upgrades that may result in temporary service interruption.
We appreciate your patience as we improve our online experience.
09-26-2011 08:36 PM
Yes. It was a bit longer of a password, not to annoy you, but just to make it a challenge. It was all normal English words ending with 3 symbols.
Here is an easier one that fits within the criteria you specified of "<InsertRandomWordHereWithAbout8To10Characters><InsertRandomNumberHereFrom0To9999Here>".
Good Luck.
09-26-2011 10:07 PM
@Ravens Fan wrote:
Yes. It was a bit longer of a password, not to annoy you, but just to make it a challenge. It was all normal English words ending with 3 symbols.
Here is an easier one that fits within the criteria you specified of "<InsertRandomWordHereWithAbout8To10Characters><InsertRandomNumberHereFrom0To9999Here>".
Good Luck.
This should be easy. The english language consists of a maximum of 4 million different words. Multiplied with 10.000 this results in a maximum of 40 billion possible passwords. I'll download an english word-list tommorow and have a try.
09-27-2011 03:02 AM
When the topic arose at the Orange County LabVIEW Users' Group meeting in mid-2009 (I think), we were told that NI could unlock password-protected VIs.
No mention was made of the price for that service.
Jeff
09-27-2011 08:04 AM
@TorPedoCXC wrote:
This should be easy. The english language consists of a maximum of 4 million different words. Multiplied with 10.000 this results in a maximum of 40 billion possible passwords. I'll download an english word-list tommorow and have a try.
Does this include text-messaging "words" like "u" and "ur" and "4 u"?
09-27-2011 08:17 AM
I heard an intersting arguement about helmets and american football (go Steelers!) that examined the question "Do helmets actually reduce injuries of encourage more?" Without taking you through the word for word version it sums up as "Rugby is the same game but without helemts and lower injuries. Helmet clad players use the helmet as a weapon so more kneck and head injuries."
So...
Sharing the word about the hope of recoving the password protected code is like saying "Go ahed through yuorself at them, you have a helmet!"
If code is imporatnat enough to passwor protect then the password should be handled as if it the same.
Just my 2 cents,
Ben
09-27-2011 02:22 PM
Fantastic Ben..... P.S, I play Rugger (A slang word for Rugby) http://en.wikipedia.org/wiki/Rugby_football
10-06-2011 08:12 AM
So ... still waiting to see if the password was cracked.
10-06-2011 12:32 PM
Inevitably he discovered that the GPU technique is amenable to brute force attacks, but not so much a dictionary attack. By his numbers, a brute force attack could take up to 7 years depending on the length of the word and the number (and this assumes only lower case letters!).
If you want to know if this method is possible, post a LV9 VI with a lowercase english word password. Of course in real life this is like locking your car but leaving the windows rolled down.
10-06-2011 03:59 PM
@Darin.K wrote:
Inevitably he discovered that the GPU technique is amenable to brute force attacks, but not so much a dictionary attack. By his numbers, a brute force attack could take up to 7 years depending on the length of the word and the number (and this assumes only lower case letters!).
If you want to know if this method is possible, post a LV9 VI with a lowercase english word password. Of course in real life this is like locking your car but leaving the windows rolled down.
Yes, the GPU brute force method enables you to crack simple and medium passwords, especially when the word is found in a dictionary. It took me a while to find and build an english dictionary and another mere 10 seconds to try out all 60.000.000.000 (3.000.000 words (including some gibberish), 10000 possible numbers, +words with first letter uppercase). The password that was used was not found though, so I think he misspelled the word or that it may be in another language. I am not here to prove anything about my skills of applying brute force, because that does not require too much, but it should be obvious that it's not okay to just use an MD5 hash to secure one's VI. Especially when you consider that the MD5 algorithm seems to have some more weaknesses that were discovered recently. All old methods and threads that dealt with unlocking a block diagram suggested to use the lock state set method which enables you to try out 10.000 passwords per second. So my new suggestion improves this by multiple magnitudes. If that's enough for your specific case is not guaranteed, but it's your best bet until someone comes up with something better.
I don't know how you calculated 7 years. Some tests I did showed that it would take the following amount of time to break a certain type of passwords.
* to calculate a PW that's found in a dictionary with an added number = depends on the number, if a integer number up to 9999 is used, it's 10 seconds
* to calculate an only lowercase 8 character PW: 26 ^ 8 / 6.000.000.000 pw/sec. = 34 seconds
* to calculate a mixed case 8 character PW: 52 ^ 8 / 6.000.000.000 pw/sec. = 8909 seconds (roughly 2 and a half hour)
* to calculate an only lowercase 12 character PW: 26 ^ 12 / 6.000.000.000 pw/sec. = 15.904.826 seconds (about 184 days)
Compare these numbers to your old method...
I agree to the statement that you should use a proper password and since I said everything I wanted to say there was no need to add another post. That's the reason because I did not answer earlier to this thread.
But now I'm curious which password was used to lock the VI. Could you please solve the riddle?
10-06-2011 04:32 PM