Hackernoon logoWhat Ali Baba Should Have Taught His Brother Before Entering The Secret Cave by@z3nch4n

What Ali Baba Should Have Taught His Brother Before Entering The Secret Cave

Zen Chan Hacker Noon profile picture

@z3nch4nZen Chan

Interested in Infosec & Biohacking. Security Architect by profession. Love reading and running.

How to make your password memorable but strong

In the fairy tale of Ali Baba and the Forty Thieves,” Kasim, the elder brother of Ali Baba, died in the secret cave. 

Kasim goes to the cave, taking a donkey with him to take as much treasure as possible. He enters the cave with the magic words. However, in his greed and excitement over the treasure, he forgets the words to get out again and ends up trapped. The thieves find him there and kill him.

People think that Kasim died in his greediness. But as I see it, this story could have a happy ending if he knew one thing. One thing that we often forget and are frustrated about.

“Open Sesame”

Kasim forgot the password when he wanted to leave the cave with treasures in his hand. No one in real life would forget a passphrase like this, but we are no better than Kasim in many perspectives.

What is a weak password?

Password rules are always the first thing in my awareness training for customers. This is the most related rule for all employees, with different levels or different units. This time, let me share it with all of you so that more people know about this.

To build an easy to remember and adequately secure password, let’s explain the opposite examples. According to SplashData, the most common passwords are:

  • 123456
  • 123456789
  • qwerty
  • password
  • 1234567
  • 12345678
  • 12345
  • iloveyou
  • 111111
  • 123123

Other common passwords including:

  • Nothing
  • Secret
  • Password1
  • Admin

If you use one of the above, you should consider changing it right after seeing my password rules. Before that, it is better to understand what kind of password is more susceptible to be cracked.

Hackers use password cracking software with a giant password database to try passwords. From the example above, using a single word or numbers are not as good as those, and all their variants would be included in the “password table” of hackers. The simple rule is not to use those as it is susceptible to be cracked within minutes.

Zen password rules

Most websites with login would include a password policy that forces the user to create a password with a certain complexity level, such as special character, upper and lower case, and alphanumeric in nature. 

All these rules are trying to increase the complexity of a password. Therefore, I would suggest you keep them in all your passwords so that you do not need to re-type repeatedly when creating an account.

PLM — Password Length matters

This is from a study in 2015

“the effect of increasing the length dwarfs the effect of extending the alphabet [adding complexity].

FBI Tech also follows the same recommendation. They pointed out, “Instead of using a short, complex password that is hard to remember, consider using a longer passphrase.” where this is originally from the NIST Special Publication 800–63B.

Key Point:

Longer passwords, even simple words or constructs, are better than short passwords with special characters.

Open Sesame 2.0

The following is my step-by-step guide on how to generate an “Open Sesame 2.0”.

1# Create a “Seed” for passwords

Computer systems use the seed to generate random numbers. What is a “seed” for you? It is the start point of creating all your passwords. You can use your company email and do some transformation or making one from your name. 

There is only one requirement for this rule — keep it secret.

Seed should be related to you that helps you remember but at the same time complex enough to prevent guessing. It can be your name or the name of your favorite TV character, i.e., MrRobot.

2# Letters Transformation

If you are like me, is a fan of the TV show — Mr. Robot, you would probably notice this from each episode’s official titles.

Mr. Robot (TV Series 2015-2019) - IMDb

Created by Sam Esmail. With Rami Malek, Christian Slater, Carly Chaikin, Martin Wallström. Elliot, a brilliant but…www.imdb.com

  • “eps1.0_hellofriend.mov”
  • “eps1.1_ones-and-zer0es.mpeg”
  • “eps1.2_d3bug.mkv”
  • “eps1.3_da3m0ns.mp4”
  • “eps1.4_3xpl0its.wmv”
  • “eps1.5_br4ve-trave1er.asf”

Hackers normally communicate in forums using this kind of letter transformation to bypass past detection or keyword blocking techniques. 

However, they are less effective when AI is introduced in the scenarios. Still, it is beneficial for creating a complex password that could easily remember but hard to guess.

For examples:

  • “0” as o or O, e.g. zero → zer0
  • “1” as I or l, e.g., traveler → trave1er
  • “4” as A, e.g., brave → br4ve
  • “@” as a
  • “3” as E
  • “2” as Z

You can use your 0wn tr@nsl4tion, but the rule is t0 k3ep 1t consistent. Using this rule, you can fulfill most of the complex password policies.

3# Make it rememberable

As the computer is part of life, we integrate with different systems and websites, no matter the job or leisure, which requires us to log in. 

While it is frustrating to click the forgot password button every time you go back to a website, you seldom use it or are just forgetful. It is also a bad idea to use a SINGLE PASSWORD for all your accounts (Please do not do that. If you do, change it now!). 

The second rule that helps you to remember is to include the URL in your password. Yes, you read it correctly. I am asking you to consider including the website’s URL in your password.

Some companies require users to change their passwords every 30 days or so. It is a good practice and part of some security standards. It would be a challenge if the user cannot remember what they type in. In that case, I suggest you consider adding the date during the change in your new password, e.g., 20201201 for 17th December 2020.

4# Combining 1# to 3# to come up with a great password

So now you know how to transform letters into complex password elements. It is also easier to have the URL or date in your password to help you remember where and when you type it. The rule uses a “seed” and combines it with a variable related to when or where your account belongs.

Key Point:

Seed + URL (+date) = Strong but easy to remember

Consider the following walk-through example:

Let say Mr. Robot wants to join Netflix. When creating an account, he can first transform his name “MrRobot” into “MrR0bo4” (use it as seed) and “Netflix” into “N3tf1ix” (variable). As a result, a good password option could be:

  • MrR0bo4@N3tf1ix
  • MRatN3tf1ix
  • MRatNetfl1x
  • MrR0bo4@Neflix.com

Can you follow it? If he wants to join amazon.com also, then the possible password combinations could be :

  • MR@Am4z0n.com
  • MrR0bot@Amazon.com
  • MrR0bot@4m@zon.c0m

The key is keeping the seed but changing the remaining part. Remember NOT to tell anyone about what remain unchanged. The seed is the ultimate secret and cannot be written down or tell anyone.

5# Test your created password

The test result of password “MrR0bot@4m@zon.c0m” | screenshots by the author

After some practice of thinking, you can use it anywhere. But before start changing passwords from different websites, you can test your password strength using the following portal:

Password Strength Test - My1Login

If you're reading this section, then good - the quickest way to get hacked online is to be too trusting or assume…www.my1login.com

The Weakest Link

Image by Melk Hagelslag from Pixabay

First thing first, you should know by now that hackers in real life are not like in most movies or TV shows (except Mr. Robot). Hackers try not to penetrate a system with complex malware or tools. It is because it is the most labor-intensive and cost-ineffective. 

Instead, they often get in by compromising the weakest link — people. Therefore, as a security professional at work, one of the most concerning areas is password security

“Pwned”

One thing that is not the same in the digital world and the physical world is the concept of steal. If your wallet is stolen in the physical world, you know it when you put your hand in your pocket. Because it is not there, right?

But in the digital world, what is stolen is still there. Therefore, it is a good start, to begin with how to check if your identity is stolen —or pwned.

Let talk about what is “Pwned.” According to Merriam-webster:

Pwn is a lot like own, then, in the sense of 1b, “to have power or mastery over (someone).” (This is, of course, no coincidence. The word likely has its origin in a mistyping of own, what with the p and o being so close to one another on the QWERTY keyboard and all.)

From a security point of view, being pwned means gaining unauthorized access to your account. In most cases, pwned means something was stolen, no matter your credentials or that of someone who has access to yours.

So how to check if my account is safe?

Yes, some good guys try to help. One of them is Troy Hunt, the creator of HIBP.

1# Have I been pwned (https://haveibeenpwned.com/)


Screen capture of HIBP | copyright by the author

Have I been pwned — HIBP is a free and public website to check if your email account is a victim of recent hacks or compromised recently. It is also the most mentioned website for the general public.

Final Words

Password is the first line of many security measures. If you use a simple password, then all the followings become useless, no matter how advanced the tools are. 

While making a complex password is challenging for some people, I hope that by sharing my Zen password rules, you get some ideas about generating a good password that is easy to remember. And please feel free to check your status of current accounts by HIBP.

In Summary, here are my Zen’s password rules:

PLM —Password Length Matters

How to generate a good password?

  1. Create a seed (Do not tell anyone)
  2. Letter Transformation
  3. Anchoring with URL or Date (Seed + URL + Date)
  4. Generate (Practice) and test the strength

Thank you for reading —happy reading and strengthening account security.

Tags

Join Hacker Noon

Create your free account to unlock your custom reading experience.