We select the password to the Indian TIN for two seconds, or why brute force math
- Transfer
In India, there is a local analogue of our TIN - “adhar”. The electronic system “eAdhar” is bolted to it. In eHadhara, every letter is blocked with a password. And everything would be fine, but the password is composed according to a simple pattern: the first four letters of the name caps plus the year of birth.
Four capital letters and four numbers. Of these, you can make 2,821,109,907,4456 combinations. If you check a thousand combinations per second, one password will take ninety years.
Long Can accelerate a couple ( billion ) times?
92 years → 52 days. Grouping
With three trillion combinations, we barely had enough. Still, the pattern is known:
([A-Z][A-Z][A-Z][A-Z]) ([0–9][0–9][0–9][0–9])
(4 заглавные буквы) (4 цифры)
(Группа 1) (Группа 2)
If we take into account this pattern, then lines like S2N65GE1
you can immediately drop. How many combinations will you get?
The first group is four letter symbols. 26 options, 4 positions, we get:
4 positions of 10 digits, similarly:
From this we get the total number of combinations:
Let us estimate how much faster brute force will be now. Again we proceed from 1000 attempts per second:
Or 52 days, 21 hours, 22 minutes and 40 seconds. Instead of 92 years. Not bad. But still long. What else can you do? The same is to reduce the number of combinations.
52 days → 12 hours. Turn on common sense
The first and second group is not a random set of characters, but the first letters of the name and year of birth. Let's start with the year of birth.
There is no sense in selecting passwords for those born in 1642 or 2594. So the range of combinations can be safely reduced from 0000–9999 to 1918–2018. So we will cover the plus or minus of all those living between the ages of 0 and 100 years. This reduces the number of combinations and time, respectively:
Or 12 hours, 41 minutes and 37 seconds.
12 hours → 2 minutes. Sacrifice accuracy
12 hours is cool, but ... We need to go deeper .
We now have 45 million combinations that accurately cover all eAdhara users. But what if you donate them a small fraction for the sake of speed increase?
Digital combinations, we have perfected. Letters do something similar. The logic is simple: there is no year of birth 9999, and in the same way there is no Indian name c "AAAA" in the beginning. But how to determine all suitable combinations?
I collected Indian names from the catalog site, Photon helped me a lot with this . The result was 3,283 unique names. It remains to trim the first four letters and remove duplicates:
grep -oP ”^\w{4}” custom.txt | sort | uniq | dd conv=ucase
It turned out 1 598 prefixes! There were a lot of duplicates, because the first four letters in such names as “Sanjeev” and “Sanjit” are the same.
1 598 prefixes - not enough for the one and a half billion population? I agree. But do not forget that these are prefixes, not names. I posted the resulting list on Gist . In fact, they should be more. You can get stuck, collect 10,000 names from other sites and get 3,000 unique prefixes, but I didn’t have time for that. So we will make a start from 1 598.
Calculate how much time you need now:
Or 2 minutes and 39.8 seconds.
2 minutes → 2 seconds. Wikipedia help
2 minutes 40 seconds is the time it takes to go through all the combinations. And what if the eleventh combination is correct? Or the last? Or the first?
Now the list of combinations sorted alphabetically. But it is meaningless - who said that the names in “A” are more common than in “B”, or that there are more than one year old children than seventy-year olds?
It is necessary to take into account the probability of each combination. On Wikipedia write:
In India, more than 50% of the population is under 25 and more than 65% is under 35.
Based on this, instead of a list of 1–100, you can try this:
25–01 (в обратном порядке, потому что с возрастом выше шанс того, что у человека есть адхар)
25–35
36–100
Then it turns out that the probability of the first combinations increases to 50%. We cracked half the passwords for
seconds! In the following
seconds, we will pick up another 15% of passwords. Total - 65% of passwords in 55.9 seconds.
Now to the names.
In Google it is easy to find the TOP-100 names of any country. Based on data from India, I moved the appropriate combinations to the top of the list. We assume that 15% of the population of India has popular names. So 15% of passwords can be cracked almost instantly.
Hindu - 80% of the population of India. So, if you put the Hindu names above in the list, it will speed up 80% of attempts. After the previous step we have leftattempts. If 80% of them are Hindu names, then 79% (leaving 1% for popular, but not Hindu names) we will crack in the next 65% of attempts.
We calculate everything together, taking into account age statistics. We divide into groups:
100: Общее количество {
50: от 00 до 25 лет {
7: популярные имена,
43: непопулярные имена {
34: индусы,
9: не индусы
}
}
15: от 26 до 35 лет {
3: популярные имена,
13*: непопулярные имена {
10: индусы,
3: не индусы
}
}
45: от 36 до 100 лет {
7: популярные имена,
38: непопулярные имена {
30: индусы,
8: не индусы
}
}
}
Now we will make an effective password cracking algorithm:
Red numbers are a search priority. We will test combinations for the first group of people first, then the second, then the third, and so on.
How much time is needed now for hacking?
Phase #
1 1 = 11 seconds for breaking 7 passwords
2 = 3 seconds for breaking 3 passwords
3 = 11 seconds for breaking 7 passwords
We cracked the passwords of 17 people, 83 left. Delete the previous combinations from the list and we will try the following sets - 4, 5, 6.
Phase # 2
4 = 54 seconds for breaking 34 passwords
5 = 16 seconds for breaking 10 passwords
6 = 47 seconds for breaking 30 passwords
Again, remove the combination of the previous phases.
Phase # 3
7 = 14 seconds for breaking 9 passwords
8 = 5 seconds for breaking 3 passwords
9 = 12 seconds for breaking 8 passwords
Total time : seconds or 2 minutes and 13 seconds.
Hacked passwords : 100
Average time for one password : seconds
92 years → 1.73 seconds. So, yes?