Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Password cracking and Psychology

2025-04-04 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Code cracking and Psychology part I: ten basic laws

Rule 1: most people overestimate the difficulty of deciphering passwords and underestimate the risks of their own passwords, so they tend to regard people who can crack passwords as mysterious people, and have little habit of changing their own passwords.

Rule 2: most people usually use no more than three passwords in their lifetime. If you crack someone's QQ password, you may also crack his forum password, mailbox password, game account password.

Rule 3: in terms of gender, men's passwords are more difficult to break than women's; in terms of age, the passwords of young people are more difficult to break than those of people over 35 years old; from the level of education, people with college degree or above are more difficult to crack than those with the following education, and there is basically no difference in the difficulty of cracking passwords among people with junior college, bachelor's or master's degrees. From a professional point of view, the password of science students is more difficult than liberal arts students, and computer-related students are the most difficult to crack.

Rule 4: the passwords of most people basically have definite meaning, and passwords composed of random random codes are extremely rare (it should be said that I have never encountered them, but if it is such a password, my mind-based thinking, there's nothing I can do about it).

Rule 5: most people's passwords are made up of either numbers, lowercase letters or numbers plus letters, only a few people use underscores, and very few letters are case-sensitive.

Rule 6: many of the letters used in the password are the pinyin of the name, the whole or initials of the name pinyin, the English word of a totem (usually a noun)-the meaning of the totem is later mentioned, the initials of a unit name, and the pinyin or English of a place name and its abbreviations.

Rule 7: many of the numbers used in the password are related to the date, which is of great significance to the owner of the password, and many are related to place names and phone numbers.

Rule 8: if you use an underlined password, the underscore usually appears only once. Generally speaking, the owner of this kind of password has a strong sense of password protection, and the password often contains numbers and letters. the position of the underscore of this kind of password is usually in the separation of numbers and letters; letters are case-sensitive passwords, capitalization usually appears only once, and often appears at the beginning of the password, rarely at the end.

Rule 9: unless the login system has a strict limit on the number of digits, the number of passwords is usually 8 to 11 digits, passwords with less than 7 digits and passwords with more than 12 digits are rare.

Rule 10: the password of a public network usually contains very little personal information, mostly the full name of all or some part of the name of the unit in Chinese or English, or the initials of English or Pinyin, plus numbers with specific meanings, which are usually phone numbers or house numbers. in addition, some passwords are simple repetitions of the above specific letters or their abbreviations, such as 12341234, abcabcabc. Personal passwords rarely occur in the above simple repetition.

Part two: the psychological characteristics implied by the ten laws.

I. inertia

From many of the above rules, we can see that people are more or less lazy, for example, very few people will change their passwords regularly; for example, very few passwords will be case-sensitive, because at least one case switch must be made; for example, the use of the same password for different accounts is a strong proof of inertia.

Second, self-awareness

Self-awareness is often reflected in the password for the use of a name. usually, people with strong self-awareness attach great importance to their own name or reputation, so once their password uses their own name, it is often the full spelling of their first name, using fewer abbreviations and not omitting their last name. in addition, a large number of such people use English words from a certain totem, such as someone who worships a certain idol very much. So, this idol is his totem, and its password is probably related to this totem.

III. Awareness of self-protection

It is easy to prove the problem of self-protection from the fact that public passwords seldom contain personal information. generally speaking, when a certain network manager or other person of a particular nature of work needs to set a password for a public account, the first thing to consider is that the password is easy to be understood and remembered by others. However, when a person thinks about secrets and other things, the first thing he associates is himself. Because these things involve his personal privacy, they are easily excluded by his subconscious.

Love and sense of responsibility

Many people's passwords use such information as the names or birthdays of their partners and children, wedding anniversaries, the date of the establishment of their own company, and so on, which is a clear sign of love and responsibility.

Fifth, perfectionism tendency

The tendency of perfectionism is mainly reflected in symmetry and balance in passwords, which can be easily seen in combination passwords with names and dates and passwords with underscores. For example, if someone is named Zhang San and his birthday is January 1, 1980, if the former is adopted, the password is often zhangsan19800101 or zhangsan8011, which is unlikely to be set to the type z1h9a8n0g0s0a1n01. If you use an underscore password, you are more likely to use zhangsan_19800101 or zhang_san_19800101 and less likely to use the _ zhangsan19800101 or z_hangsan19800101 type.

Part III: common brainless passwords

The so-called brainless password refers to the kind of password that does not have any technical content and can be cracked purely by luck. This kind of password is usually public, and its structure is often as follows: a simple repetition of a number, a numerical sequence of a simple rule, a simple regular alphabet sequence, a combination of numbers and letter sequences according to some simple rules, the above four kinds of passwords have the following typical examples: 01223456789 1231231231231231234no 0987654321Joe 13579824680.

Or something like this: qwertyuiop,abcabcabc,abcdabcd,abcdefg, eight 8s, eight 6s, eight 1s, eight zeros, eight or nine 9memorials abc1234 memorials abc123abc123 memorials abcd4321, simple repetition of the city area code, and so on.

This kind of mindless password is common in public network or mailbox accounts. When trying to crack public passwords, I usually give priority to these passwords mentioned above. When I was in Beijing, I used qwertyuiop to crack the password of a router. After I came to Chaozhou, I used 1234567890 to crack the password for the first time. Later, I learned that it was the password of my colleague's mobile network. Now the network I use is neighbor's, and the password is 8 8.

Part IV: router password cracking of public network

In fact, strictly speaking, as long as the router is connected, the network must be shared, so as long as the network connected to the router, can be regarded as a public network, the difference lies in the degree of public, generally speaking, from the degree of public, routers can be divided into four categories: public places, companies, public rental housing, families, in which the higher the degree of public use, the lower the difficulty of password cracking.

I. password cracking of routers in public places

Public places usually include hotels, eating places, Internet cafes, shopping malls and other places with a large flow of people, where the crowd is determined but the identity group is unstable. The network of such places basically does not contain any personal information, and most passwords are brainless passwords. In addition, the most common passwords are the following:

Pinyin or simple repetition of the name of the place

The simple repetition of the house number of the place or the first half is the house number, and the second part is the reverse order of the house number.

The name of the place is pinyin or English plus the house number or branch number of the place

Venue × ×, room delivery phone or 400 toll-free service number

Place name pinyin or English plus 4 to 6 for brainless passwords

A simple repetition of the bus number of a certain road at the entrance of the place.

Generally speaking, many places do not set passwords, and setting passwords is not very useful. The purpose of setting passwords is usually to prevent embezzlement by nearby merchants or residents, but as long as these users put a little effort into it, it is easy to get the password.

2. Password cracking of company router

If you search for a network with more than four capital letters, the network is likely to be a corporate network, and the combination of passwords is usually very simple, in addition to the brainless passwords mentioned above. It is likely to take the following forms.

Simple repetition of company name Pinyin or English, such as China Mobile, the network of one of its stores may be zgydzgyd, or chinamobile

The simple repetition of the company house number or the first half of the house number is the house number, and the second part is the reverse order of the house number. For example, if a company is located in Room 1606 of a building, the password may be 16061606 or 16066061.

The telephone number at the front desk of the company, and sometimes the area code of the city where the company is located.

Company name pinyin or English plus company house number

Company name pinyin or English plus a 4-to 6-digit mindless password

Company name pinyin or abbreviation plus the last 4 digits of the phone number or telephone number

In short, the company's network due to the use of many people, so, its password contains less information that is difficult to remember, the difficulty of cracking is very low, as long as you have the patience to try several times, generally speaking, it is not difficult to crack. As for the company's name, house number and phone number, I think as long as you have worked in some office buildings, you don't need me to teach you.

Third, the password solution of public rental housing router

The so-called public rental housing here refers to the houses rented together by people from different places who do not know each other or students, friends, and colleagues who are close to each other, including university dormitories and staff dormitories, as well as renting houses independently of each other. but share a network of users.

The password type of public rental housing has been more or less close to the family password, but because the relationship between members is not as close as the family, it still contains less personal information, and the success rate of cracking is still considerable. In addition to the mindless passwords mentioned above, there are usually the following types of passwords for public rental housing:

The whole of the pinyin of the community name or floor name or a simple repetition of the pinyin abbreviation, such as "Jinbi Garden", the password may be jinbihuayuan or jbhyjbh

The room number or the building number plus the room number or its simple repetition, or the first part is the room number, and the second part is the reverse order of the room number. For example, when I lived in Beijing, I lived in Unit 2, Room 1202, Building 2 of a residential district. The password I set for users who rented my network was 12022021. At the same time, when I tried to log on to the neighbor router, 1201 of the public rental housing users lived in 12011201. The user who lives in room 3 on the 11th floor has a router password of 02021103.

The abbreviation of the community name plus the room number, for example, the community where I live in Beijing is Hualong Meisheng, and I found the user in Room 2 downstairs, whose router password is hlms1102.

The telephone number of the dormitory or preceded by an area code, for example, the telephone number of a university dormitory in Guangzhou is 61306325, then the password may be 61306325 or 02061306325.

A certain telephone number that is often used by public rental housing users, such as water phone, gas phone, food delivery phone, and so on.

IV. Password cracking of Home Router

Among these four types of passwords, family passwords are relatively easy to crack, because people are very close to each other, so such passwords usually contain a lot of family information. However, from a human point of view, people who are intimate also have privacy with each other, so such passwords usually do not contain real inner privacy, therefore, compared to personal passwords. It is much less difficult to crack.

Many home router passwords still use the above mindless passwords, while others have the characteristics of public rental housing passwords. I will not repeat all of these. Let's talk about the characteristics that home router passwords do not have relative to public rental housing passwords and their cracking methods.

The simple repetition of family surname pinyin is common in families with more than four letters of surname pinyin, such as Zhang and Zhou, while surnames such as Li and Lin are much less common. In addition, it is interesting that passwords that are simply repeated with a surname are usually capitalized, and some even capitalize the first letter. For example, for a family surnamed Zhang, the password may be in Zhangzhang or ZhangZhang format.

The phone number or area code plus the phone number of the house where the family lives. This kind of code is sometimes added to the phone number by one or two security codes at the end of the number for security reasons. For example, if the phone number of a home is 81008100, its router password may be 810081000, and the last 0 is the security code.

The phone number of my hometown, which is a password rule I found when I read the information mentioned above. At that time, I found that several people used this type of password. One of them filled in the mailing address of their registration information in Beijing. The household registration address is from a county in Hebei, and the password starts with 0, which looks like a phone number, so I look it up on the Internet. Sure enough, the first few digits of this password correspond to the county area code where his household registration address is located, and it is concluded that this is a phone number of his hometown, although it belongs to a personal password, but because the phone of his hometown is known to family members, it is entirely possible to be used as a router password.

The pinyin of the family name plus the phone number or mobile phone number.

The following are the rules that I think may exist, but because there is no relevant information in the previous cracking process, so they have not been verified, they are also put forward for your reference.

Husband and wife's surname plus wedding anniversary, it is possible that two surnames are linked together, followed by a wedding anniversary, or it is possible that two surnames are placed at both ends and the wedding anniversary in the middle.

The name and life of the first child plus the child's birthday.

Father's or mother's birthday.

The wife's name between husband and wife, the husband's private pet name plus his wife's birthday. This is determined by the gender division of labor, because men know more about things that usually involve computers, so it is entirely possible to take this opportunity to express love to their spouse.

The name of the pet at home plus a number with a specific meaning.

In short, as long as you have enough information, through the above verified and unverified rules, there is a great possibility to crack someone else's router password.

The above is the main content of the router password cracking of several kinds of people distribution network, and sometimes, the above method is not even needed to crack the password, because the router is usually only a few brands, and the router addresses of many brands are fixed. For example, many models of TP-link and many other brands use the address of 192.168.1.1. Like Tengda, many people use 192.168.0.1, while the default initial login account and password of all major brands of routers are admin, but many people do not know how to operate, and some people do not want to change the login password of the router even if they know how to operate, so sometimes you may easily enter other people's routers to carry out operations such as setting a fixed IP, modifying traffic, restarting the router, and so on. If you search for a network with a brand name such as Tenda,TP-link_2D18FA, it is very likely that its router login password has not been changed, as long as you know how to operate the router, then this kind of network is easy to break through.

Part V: personal password cracking based on personality analysis

I. elements commonly used in personal passwords

Pinyin or abbreviations of one's name, partner's name, child's name.

Your birthday, partner's birthday, child's birthday, father's or mother's birthday, your company's opening anniversary, wedding anniversary, the death date of a relative, and other dates that are of special significance to the password owner.

Home phone number, hometown phone number, personal mobile phone number, lover's mobile phone number.

The number or number segment of *, * * license, driver's license, business license of your own company, business license, etc.

The name or date of something related to what one pursues or worships (that is, a totem).

Nicknames for yourself, relatives, pets and totems.

The name of a lover or a totem (usually abbreviated), plus a string of numbers with homophonic characteristics such as 1314 (for a lifetime) or 5201314 (I love you for a lifetime).

2. Totem

"Totem" is embodied in the spiritual world of modern people, and most of the time it is a symbol of beautiful things such as love, ideal, personality reference and so on. Its general meaning is usually related to religion or primitive worship, and the reason why religion can always exist is that it can reach the depths of human heart, and the characteristics of password "secret" and totem can be easily combined with each other, therefore, some things associated with totems can easily be chosen as the carrier of passwords.

There are usually the following common totems in passwords:

The name of the first love or its initials, or the English nickname, the birthday of the first love or the date of the first love, something related to the first love, such as the name of a pet, the place of the first date.

The name, nickname or birthday or death date of a particular worshiped person.

The name of a particular place to look forward to, including a place or hometown that you swear to visit once in a lifetime.

A particular mythological figure or something related to an ideal life, such as Utopia.

The name of a person or thing who had a great influence on him in his childhood, such as "rosebud" in the movie Citizen Kane. If Kane was born in modern times, I just said that his password would contain this word 100%.

Third, the habit of using passwords among people of different personality types

Due to the different standards used, various psychologists and anthropologists at all times and at home and abroad have different methods of classifying people. For example, Confucianism usually divides people into saints, gentlemen and villains. Liu Gou in the period of the three Kingdoms divided people into English, male, handsome and Jie according to their talents. According to the combination of the eight characters of birth, Chinese numerology divides people into many types, such as "financial officer Shuangmei" and "eating god giving birth to wealth", while the classification rule of "25 people of yin and yang" divides people into 25 categories according to the temperament embodied in the five elements. Western psychology is distinguished by constellations and by nine types of personality, while Freud divides people's thoughts into conscious and unconscious. Spranger divides personality into six types: theory, economy, art, society, politics and religion.

Because the theoretical basis is different, the classification method is different. For passwords, the classification methods provided by any of the above theories are difficult to correspond to the password usage habits of this group. Therefore, I will combine my own experience and my own thinking to classify the people corresponding to different types of passwords.

Since I have not cracked too many passwords in the past, and all the people involved in the material I have read have never met, and I have not taken a systematic course in psychology, the following classification is not necessarily scientific. it is hard to avoid omitting certain personality types, and at the same time, there is a lack of statistical evidence to support it, so you might as well regard him as nonsense. In particular, it should be pointed out that the following categories of people, there are no strict boundaries, there are many people at the same time have different personality characteristics, so their passwords will also have their own characteristics.

1. Sense of responsibility

The sense of responsibility usually comes from self-confidence and strong love for their families. Such people are usually more successful in society, have specific criteria for judging social phenomena, and their views are not easily moved by others, which is reflected in their living habits. They usually choose their jobs cautiously and have clear goals, and their daily life is relatively simple. Apart from work, they spend a lot of time with their families. The money earned is usually spent on the family or given to a loved one for safekeeping. The password of this group usually includes the following elements: the name, nickname or birthday of the lover, the wedding anniversary, the name, nickname or birthday of the child, the phone number of the hometown, and the birthday of the father or mother.

2. Cleanliness type

Here it refers to the spiritual cleanliness fetish, in which there is a specific boundary in the mind, which is a forbidden area that neither oneself nor others are allowed to cross. Such people are either particularly successful or complain all day long; they are either like diplomats or extremely withdrawn; at the same time, some of the actions or social imaginations of others have criteria that are difficult for ordinary people to understand, and such people usually have a strong sense of self-consciousness. and have a strong yearning for an ideal person or life, and deep in their hearts, there is usually a failed but unforgettable emotional experience. For this type of people, the most likely password is to use totems.

3. Two-rib insert knife type

This kind of people usually have very strong leadership temperament and extremely self-confident. they usually have a lot of friends and are very active. They belong to people who get sores on their buttocks after sitting for a long time. They often bring a large group of friends home to eat or sleep every now and then. They often stay up at night. When friends need help, they usually lend a helping hand without saying a word, and often have a rough road. They usually have a strong sense of themselves. Rarely fortified against people. The type of password is usually either brainless or your name plus date of birth, and the name must be the last name plus all the letters of the first name, rarely use abbreviations, add at most one or two anti-theft codes, and sometimes use relatives' information.

4. Fantasy type

Fantasy usually exists in teenage girls, whose Qzone, blog and Weibo usually have dazzling colors, and usually use some fairy tales, myths or things that may exist in the fantasy world. They pursue fashion and like to watch idol dramas. They often do childish behavior, and they are usually very protective of small animals. Many people have the habit of keeping pets. They usually have good family conditions and are spoiled by their elders since childhood. Deep down, they are usually very selfish, even though they are not so on the outside. This person's password type usually uses a totem, and the totem is usually the name or birthday of a Prince Charming, or the name of a pet, or something she imagines.

5. Aggressive type

The so-called belligerent type does not mean that he likes to quarrel or fight with others on the surface, but refers to someone who does not know how to fight with you on the surface, but secretly competes with you in the dark. For example, once you won the first place in the exam, and he won the third place in the exam. When other people compliment you and ask you to treat you to dinner, he will find an excuse not to go, or appear to have a lot on his mind, and will study harder in private, hoping to surpass you in the next exam. Such people are usually highly self-conscious, unbearably conceited and jealous. The password of this kind of person is usually related to himself, and the password he uses usually contains his nickname, name, mobile phone number or birthday, and there is a good chance of using a totem. and this totem is most likely something that strongly influenced his growth as a child or adolescence.

6. Career leader type

This kind of person usually also has a strong sense of responsibility, but compared with people with a sense of responsibility, their sense of responsibility is more focused on their work. They are strict with themselves and their subordinates and relatives. Sometimes it makes people feel unbearable. When they work, this kind of person forgets to eat and sleep. When he goes to work, never allow others to disturb him or speak. Once someone interrupts or hears something they don't want to hear, they will directly question each other. Most of the time, this person's password will use his own name or nickname, and often use abbreviations or pinyin that does not include the last name. Or a name or number related to his company or career, and sometimes a totem is used, and the totem is something that he thinks is absolutely unexpected.

7. Perfectionist

In fact, everyone has a tendency towards perfectionism more or less. For people with obvious perfectionist tendencies, they may not pay attention to the taste of their clothes, but they will pursue things with quality; the objects they worship are usually people whose personality and intelligence look perfect. Their rooms are usually neatly arranged, and sometimes when they are halfway out, they remember that something at home is not well placed, and they even run back and put him in a place that makes them look at ease. They usually like to tidy up their own room. I don't like to let others interfere, because, in their opinion, things handled by others are imperfect. Such people are usually self-disciplined and clean, and have a moral sense of superiority that is unbearable to some villains; such people may also swear, but deep down, they are extremely yearning for pure love. most men in this area have a complex, while women often yearn for love in the style of princes and princesses. The password of this kind of person, once using the name, the name is very likely to be the full name, or a specific word (such as love,great and other beautiful adjectives) plus the abbreviation of the full name, once used, the date is usually in the format of 20120101, rarely choose the format of 1211 or 120101, once the phone number is used, the phone number usually contains the area code, the phone book of their mobile phone. Everyone's first name is usually the full name, the last name is rarely ignored, and nicknames are rarely used. Once an underline is used, the position of the underline is usually highly symmetrical.

8. Realists

Realists are embodied in their thoughts and do not believe in miracles, and they are not easy to go to extremes in their behavior, but they are very extreme in their ideas. for example, they believe that the success of a celebrity is difficult to replicate, especially those around him; they think that there are no good officials among officials, and every woman in the entertainment industry is subject to hidden rules, and sometimes you can't stand talking to them. The passwords of such people, once their names are used, are usually simplified, and the dates are mostly minimalist. If underscores are used, they have no requirement for symmetry, and sometimes underscores appear in the first place. Case-sensitive letters are most common in this type of people.

The above eight personality types, so far, are all the classification of personality characteristics of passwords that I have encountered and summed up. Among the passwords I have cracked and encountered in the past, no group of people corresponding to a password has escaped the situation mentioned above. In addition, from the constellation's point of view, there are some interesting phenomena. For example, responsible passwords are usually distributed in Scorpio, Sagittarius, Leo and * *. Cleanliness codes are usually distributed in Aquarius, Gemini, Scorpio, Aries and Capricorn, while many two-ribbed knives are distributed in Aries, Pisces, Leo and Capricorn. Most of the fantasy type is distributed in Gemini, Libra, Sagittarius and Aquarius, while the aggressive type is distributed in Aries, Cancer, Scorpio, Scorpio and Capricorn. Career leaders are mostly distributed in Taurus, Leo, Libra and Capricorn, while perfectionists are mostly in Aries, Libra and Aquarius. Many realists are in Taurus, Cancer, Sagittarius and Capricorn. In addition, Gemini, Pisces and Libra are the easiest to use brainless passwords. The rules of Gemini and Aquarius using passwords are the most elusive.

Whether the above summary is correct or not needs to be further verified, and you can also find a type that you think best suits your personality characteristics, and verify it with your own password to see if what I said is correct.

Part VI: demonstration of password cracking cases

First, crack the password of a company's conference room router

Company information: IT industry; company name two Chinese characters, all pinyin for 10 letters; English abbreviation for 4 letters, assuming that the abcd; conference room is on the 16th floor, the number has been forgotten, take 1601 as an example.

Router type: a certain type of router of TP-link brand, login address is 192.168.1.1, does not have unlimited function, and account password is also required for wired login.

Network administrator: the person you know has a bit of a rough personality and is easy to swing from side to side; once you talk to him in a tough tone, the other person is afraid that he will offend you; he is often absent-minded during meetings and sometimes misses the point of speaking; he is procrastinating with no end.

Cracking process:

First of all, the analysis of the personality characteristics of network management personnel, because they are IT employees, so they usually have a strong awareness of password protection, so they are unlikely to use brainless passwords. In addition, from the habit of doing things, it can be seen that their awareness of professional service and self-identity are poor, and they are unlikely to use strict encryption.

Second, people of the above personality types usually have a sense of insecurity, so their passwords are unlikely to use their own personal information; in addition, people who are not serious usually have some inertia, and their passwords are not too long. Eight to ten digits are the most likely digits.

Third, it can be judged from the above two items that the greatest use of the password is either the 10 letters of all the pinyin of the company name, or the simple repetition of English abbreviations or English abbreviations plus 1601, or the simple repetition of a good room; further analysis, this network manager is simple-minded, usually he would rather use a sequence like 16011601 than be in the mood to reverse the latter 1601.

Finally, the account name is usually made up of letters commonly known as the convention, and it is likely to be 4 to 6 digits, so the account is most likely the company's abbreviation abcd.

End result:

Account number: abcd

Password: 16011601

Reverse the character of the network administrator from the password:

Usually his impression is completely correct, this person can be a friend, because he has no intention, will not harm you, but can not work together, because of the lack of sense of responsibility. In the future, matters related to the important nodes of the project should not be entrusted to him as far as possible, and even if they have not been entrusted to this person, they must maintain a high degree of vigilance and follow up from time to time. However, it is a great pity that I almost fell into the hands of this man at the last minute, because there were many platforms in the system at that time, and the number of proofreading had to be carried out on the real platform. Before proofreading, I specially asked him to use email and phone to determine the address of the real platform, and then arranged for more than 20 people from my company and partners to proofread for a whole day. Finally, I found that the address given to me by this person was a test platform address. I was so angry that I played cool in front of the company and their company leaders, but I had to start all over again, so I had to find more than 10 people and say nice things for a long time. I stayed up until more than two o'clock in the morning to proofread all the data. 91ri.org was glad that he didn't slow down the progress of the project.

Second, crack the personal password of a colleague

Object personal information: IT company middle manager, a number of project participants and key leaders; work seriously, methodically, graduated from a famous university; smooth, shrewd-it should be said that I rarely meet such smart people; extremely proficient in their own business ability, known in the company as "ghost talent"; calm personality, very tolerant of subordinates, often smiling, with strong personality charm Strict thinking, often read books about human nature and mathematics

Cracking process:

First of all, because this person belongs to the IT industry and has a high IQ, he usually has a strong sense of password protection, and it is impossible to use a mindless password-it should be said that it is an insult to his intelligence to think that he can use a mindless password.

Second, he is unlikely to reveal his personal information and lover's identity information in his password, and is unlikely to use his home phone number, office number and mobile phone in Guangzhou, unless it is his hometown phone number.

Third, because of his strong sense of password protection, his password is usually longer than that of ordinary people and may reach more than 13.

Thirdly, it is most likely that this person will use "totem". Because of his rigorous thinking, like mathematics, strong spatial thinking ability, will pay more attention to the beauty of symmetry, coupled with a strong sense of password protection, he is likely to use an underline. and the position of the underline will highly reflect the beauty of symmetry.

Thirdly, the totem it uses is very likely to be a common sense image that many people are easy to ignore, and it is likely to be related to their hobbies. At this time, an idea flashed through my mind-pi! In my impression, I first came into contact with this constant not in math class, but in history class. I still remember the Chinese history that the teacher boasted to us, Zu Chongzhi and the phrase "between 3.1415926 and 3.1415927". Indeed, for a math lover, what could be more appropriate than to use a constant as the image of a password in the mathematical world? Since it is something on the circle, it is a symbol of perfection, and the number of digits that are usually remembered is 8 digits, which is also very consistent with the habit of using passwords in length.

Finally, there is a combination, the decimal point is likely to be replaced by an underscore or p (point), the first choice is 3.1415926, which is actually an infinite cycle of numbers, and the infinite symbol, we know, is an 8 written horizontally, and for math enthusiasts who pay great attention to the beauty of symmetry, they are likely to make a distinction between numbers and infinity. The two passwords I first thought of were 314159268and 3p1415926_8, which were verified with their mailboxes, and both failed. Counting the length, there are only 11 characters, and the first one has no letters. As mentioned earlier, people who usually use underscores have a strong sense of password protection, and they usually use underscores, so their passwords are likely to include numbers and letters-- letters, of course, the first thing that comes to mind is his initials. In order not to disclose his personal privacy, suppose his name is Zhang San. Finally, when I cracked his password, I almost jumped up excitedly, happy for a few days, and even slept from ear to ear! My girlfriend asked me curiously why I was so happy. I always laughed but didn't say anything!

End result:

Password: zs_3_1415926_8

Reverse the character of this gentleman from the password:

This person is very demanding of himself and has a strong perfectionist tendency, as can be seen from the use of pi as the password and the highly symmetrical beauty of the password. Secondly, this person is confident but not conceited, and if he is very conceited, there is no need for him to use his name at the beginning, because usually few people will think of using an image such as pi as their password. conceited people will think that using pi is enough. This kind of person is usually broad-minded, can accept the opinions or suggestions of others, and often reflect on his own mistakes and correct themselves. in life, he will be a mentor and a helpful partner at work, and he can make deep acquaintances and work together. However, the disadvantage is that once things are related to themselves, they sometimes pursue perfection too much. It can be seen from the symmetry of the underscore used in their passwords that this kind of person will become a good project manager or senior manager sooner or later. However, it is not easy to break the rules to start your own business.

In any case, I have always got along well with this gentleman in the course of my work, and I have never blushed. This is very rare for me, a bad-tempered person. I think a large part of the reason is my heartfelt respect for him. Even when I know his password, I have always had a deep sense of guilt and guilt, so I seldom contact him!

Third, crack a neighbor's QQ password

Object's personal information: after 85, men meet every day, and each time they meet, they greet each other politely and chat for several times. during the chat, the pronunciation is very clear, occasionally scolding, concise and very organized. Rarely contains "that", "then" this Chaoshan people commonly known as "word shit"; he has a very strong aversion to some phenomena in society. Clear eyes, people feel very sunny, healthy; sometimes love to talk to me about ancient Chinese culture, western enlightenment philosophy and ideas, and chat eyes glowing, extremely excited.

Cracking process:

First of all, when chatting, I knew the year of his birth in 1987, as well as his name, assuming "Li Si", and that he was born in the countryside.

Second, people who have clear eyes and are willing to open their hearts to you as soon as they meet are usually uninvolved and lack a sense of prevention, and they often have a poor awareness of password protection. Guess that the password may be a combination of name and date of birth.

Thirdly, he speaks clearly, does not take any "shit", and likes to talk about philosophy, which reminds me of many of my Sagittarius friends and infers that he may belong to Sagittarius.

Third, Sagittarius was born from November 23 to December 21 every year. He tried desperately lisi plus 19871201 with his name, and failed about 30 times.

Suddenly, I thought that he was from the countryside, and his parents were probably still using the lunar calendar in the 1980s, so when registering him, he was likely to use the lunar calendar as I did. Use the perpetual calendar online to check the lunar calendar dates for the period from November 23 to December 21 in 1987, and the corresponding lunar calendar period is from the third day of October to the first day of November.

End result:

Password: lisi_19871011

Reverse the character of this gentleman from the password:

This gentleman knows how to use underscores, which shows that he still has a certain sense of password protection, but from his use of his name plus birthday, it can be judged that he lacks social experience and should have less contact with people in society. He should be a kind of otaku, and his job can not be in the category of sales and management, but probably in the category of technology. This kind of person is usually more fond of making friends and is very worth interacting with. He is the kind of person you can trust to him when you have a lot of money. Later, my conclusion was confirmed step by step in my further contact with him.

Part VII: personal password encryption recommendations

The occasions where passwords are needed are usually bank accounts, while the vast majority of others are login passwords for various mailboxes, some client software, or forums that surf the Internet. Most people use a fixed password when they surf the Internet, and basically have no habit of changing it, so as long as your password in a certain forum is leaked, it is very likely that all your mailboxes, game accounts and other passwords will be destroyed by others.

The existence of this phenomenon is actually very easy to understand, because of people's inertia, and now there are so many websites, if you set different passwords for each website, for many people, it is almost impossible to accomplish the task, because you not only need to memorize dozens or even hundreds of passwords, but also have to remember the corresponding relationship between each password and each website.

In fact, there is a way to ensure that your password can be changed according to different sites without memorizing the corresponding relationship. The following method is used as a starting point to provide some suggestions for everyone's password setting, which we might as well name as "random character reinforced fixed sequence passwords".

Random based character reinforced fixed sequence cipher

This noun has three key words-random, well-founded and fixed. First of all, "fixed" refers to the password you often use, a field that appears in each of your passwords, if you are used to a password, and you use it in most places, then, use this password as a fixed sequence and put it in your new password. The so-called "random" means that when you set it, you don't know what kind of characters to set in advance, but change it according to different websites or clients, but there are rules for the changes, and you set this rule yourself. and won't let anyone know. The so-called "evidence", this basis, is linked to a certain element of the website, I recommend the use of the name of the website, in order to facilitate your own memory. Let me give you an example below, and you will clearly understand the characteristics of this so-called "random character reinforced fixed sequence password".

If you used to use the password is qwert123, then, in your new password, also keep this field, and now you define such a rule: based on the name of the website, log on to any website, take its name as a reference, intercept the first letter (or number) and the last letter (number) of its name, and put them at the beginning and end of the fixed password segment, respectively. For example, if you go to Sina, whose name is sina, intercept s and a respectively, add them to the beginning and end of your fixed password group, and your password on Sina is sawrt123a. If it is a client of Xunlei, take the first letter t and the last letter r of its website name Thunder, so that your Xunlei address becomes tawrt123r. Due to such an extra layer of protection, even if your Sina Weibo password is lost, it is not easy for others to use this password to steal your Xunlei account and qq number, and because this password naming rule is simple, you can use your original password segment. You don't have to change the habit of entering passwords.

The above naming rules are entirely up to you. In addition to the truncation rule, you can also intercept the first letter or number of the site name and count the number of digits of the site name. If it is odd, the letter is capitalized; if it is even, the letter is lowercase and add it to the beginning or end of your fixed password group. If the number is intercepted, then, also count the number of digits of the site name, if it is odd, then keep such a number, if it is even, then double write it, add it to your fixed password sequence. Example: sina,baidu,163 and 2144 Sina contain 4 letters, so the lowercase sbaidu that truncates the first letter is 5 letters, so the capital B of its first letter is truncated 163is 3 characters, so take its first number 1jing2144 is 4 characters, so take the copy 22 of its first number and add it to your fixed password group, so your Sina password is sqwert123, Baidu password becomes Bqwert123, NetEase mailbox becomes 1qwert123pai2144 website password becomes 22qwert123.

In short, how to combine it is up to you to consider, but the rules of random segment interception must be clear and feasible, and you should keep in mind, and the less information the random field contains, the better, too much may not protect your password, on the contrary, it is easier for dedicated people to find the rules.

II. Suggestions on fixed character segments

Firmly do not use the information you can see on your documents, including birthdays, document numbers, names and their initials, etc., as well as similar information about loved ones and children. And don't use brainless passwords.

You can use the phone number, but try to use the home phone number, and add or subtract one or two security codes from the phone number.

You can use your lover's nickname, but it's best to use a nickname that only you and each other know about each other, especially when blowing pillows.

For bank card passwords, if you have to express your love to your lover, you can also use your wedding anniversary or birthday, but be sure to do some related operations, such as reverse order, shift, plus code and so on. For example: your wedding anniversary day is July 5, 2012, you have to use numbers like 201275 or 120775, and from a reverse point of view, it becomes 572102 and 577021; from a shift point of view, you might as well set it to 720125 or 071275; with a plus point of view, you can add only one bit, become 201276 and 120776, or you can each add 312386, 312386, 231886, what rules are up to you to choose, the key is that you are easy to remember, but others are difficult to understand. Don't underestimate this simple operation, it's probably the key to preventing your password from leaking.

There is no need to consider the beauty of symmetry, the password is not for people to see, on the contrary, it is invisible, and the invisible symmetry can only be narcissistic. Therefore, it is recommended that when you use an underscore or a number, insert it into the letter after disrupting it. It is best to have a structure that will make people look awkward once it is written-the more awkward the password, the better the password, believe me!

It is strongly recommended to use a totem because it is something deep in your heart, and sometimes even the people closest to you may not really know what you are thinking, and it is harder for strangers to guess.

Some letters and numbers are similar in shape, so when you need to use numbers, you might as well disguise them with letters, and vice versa. Including 1 and 1 and 1 and 2 and 6 and 8 and 9 and 0 and 0, respectively.

There is no need to modify your fixed character segment on a regular basis. that doesn't make much sense. on the contrary, it's easy to knock yourself out, provided you can meet the password rules mentioned above.

III. Suggestions on security issues

Now there are many websites, especially forums, for so-called security considerations, users are usually asked to set security questions when they sign up, which is almost useless in my own experience. These security questions usually let you choose one of the eight or so questions to answer. Many people usually choose birthdays in order to be easy to remember, which is not a problem. The problem is that computers are not intelligent. It does not have the so-called concept of time, on the contrary, it has a strict concept of format, for example: someone's birthday is January 1, 1980. for people, when someone asks about your birthday, whether you answer January 1, 1980, or New Year's Day in 1980, or 800101, is a concept, this concept points to the same goal, this goal is time. However, for a computer, these are completely different concepts, and for a computer, 19800101 and 8011 are very different, so it is possible that some different websites ask you the same question, but you use a different format when you answer, so that you sign up so much that you may end up confused and sometimes you can't even change your password.

Therefore, my habit is that unless the website specifies that security questions are required, I will not fill them out. If I do, I will randomly choose a question, and I will use the same standard format for any security questions on any website. I used to use "none of your business". The computer asked me which school did you go to primary school? What's your wife's name? I always answer "none of your damn business"-what I do is none of your computer's business, isn't it "none of your damn business"?

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report