Image du logo de l'article pour Time to Hack: smart password strength & crack time analyzer

Time to Hack: smart password strength & crack time analyzer

pankajtanwar.in
ExtensionOutils pour les développeurs62 utilisateurs
Élément multimédia 3 (capture d'écran) pour Time to Hack: smart password strength & crack time analyzer
Élément multimédia 1 (capture d'écran) pour Time to Hack: smart password strength & crack time analyzer
Élément multimédia 2 (capture d'écran) pour Time to Hack: smart password strength & crack time analyzer
Élément multimédia 3 (capture d'écran) pour Time to Hack: smart password strength & crack time analyzer
Élément multimédia 1 (capture d'écran) pour Time to Hack: smart password strength & crack time analyzer
Élément multimédia 1 (capture d'écran) pour Time to Hack: smart password strength & crack time analyzer
Élément multimédia 2 (capture d'écran) pour Time to Hack: smart password strength & crack time analyzer
Élément multimédia 3 (capture d'écran) pour Time to Hack: smart password strength & crack time analyzer

Présentation

See real-time crack time estimates for any password you type — based on real-world attacks, not outdated security rules.

# Time to Hack 🔐 Most websites suck at telling you if your password is actually secure. They are still stuck in the 2000s, using outdated password rules. They check for symbols, numbers, uppercase letters—then rate `Password1!` as “strong”. But any real attacker cracks that in minutes. I got tired of these outdated rules that don’t reflect actual security. So I built **Time To Hack**. This Chrome extension estimates how long it would actually take to crack your password (as you type), across realistic attack scenarios using entropy analysis, pattern recognition, and modern cracking models. ## Why Traditional Rules Fail? Composition-based rules (e.g., one number, one symbol) often lead to predictable formats: - Capitalized first letter - Year appended at the end - `!` or `123` as a suffix - `p@ssw0rd` - style substitutions Attackers know these tricks. Tools like `Hashcat` are trained on these patterns. So `Password1!` is still toast in minutes if stored insecurely. ## What This Extension Does Whenever you type a password on any site: - Estimates crack time under 3 real-world attack models - Checks against common patterns from breached passwords & highlights weaknesses using dictionary, keyboard, and pattern analysis - Finds substitutions and sequences like `qwerty`, `asdf`, `1111`, etc. - Calculates effective entropy (in bits, not gut feeling) using `zxcvbn` logic - Shows actual crack time in seconds, days, or centuries - Gives real suggestions to strengthen it ## How It Works (Under the Hood) - **Pattern Detection**: Identifies dictionary words, substitutions, sequences (asdf, qwerty, etc.) - **Entropy Calculation**: Assigns bit-level randomness to patterns, computes guess count - **Time Estimation**: `Crack Time = Guesses / Attack Speed` - **Scoring**: Uses `zxcvbn` under the hood, with custom enhancements for better UI and clarity The core logic comes from Dropbox's [zxcvbn](https://github.com/dropbox/zxcvbn) library. But it’s not just a rule-based checker. It’s trained on: - Breached password datasets - Human typing patterns - Keyboard layout guesses - Name + year combos, movie quotes, dictionary words - Smart transformations (like `p@55w0rd`) It calculates pattern-based entropy, not random guessing space. So it knows that `Dragon@123` is not strong, even if it “looks” complex. ## Attack Models Simulated | Scenario | Speed | Context | | ------------------- | ----------------- | -------------------------- | | Online Rate-Limited | 100 attempts/hour | Login page with throttling | | Offline (Slow Hash) | 10K guesses/sec | Breach + bcrypt/PBKDF2 | | Offline (Fast Hash) | 10B guesses/sec | Breach + MD5/SHA1 | ## Examples | Password | Traditional Verdict | Real Crack Time (Offline Fast) | | -------------------------- | ------------------- | ------------------------------ | | `Password1!` | Strong | 3 hours | | `p@ssw0rd` | Strong | 19 minutes | | `blueberry pancakes` | Weak | 89 years | | `correct horse battery...` | Weak | Centuries | ## Built with ❤️ by [Pankaj Tanwar](https://twitter.com/the2ndfloorguy), and checkout his [other side-hustles](https://pankajtanwar.in/side-hustles) ## Contributing I welcome contributions to the `time-to-hack` project! Whether it's a bug fix, a feature request, or improving documentation, your contributions are appreciated.

Détails

  • Version
    0.0.1
  • Dernière mise à jour
    5 mai 2025
  • Taille
    4.96MiB
  • Langues
    English
  • Développeur
    Pankaj Tanwar
    Kurbada Neem ka thana Sikar, Rajasthan 332713 IN
    Site Web
    E-mail
    pankajtanwar510@gmail.com
    Téléphone
    +91 77409 96673
  • Professionnel
    Ce développeur s'est identifié comme professionnel selon la définition de l'Union européenne et s'engage à ne proposer que des produits ou services conformes aux lois de l'UE.

Confidentialité

Le développeur a indiqué qu'il ne collecterait et n'utiliserait pas vos données. Pour en savoir plus, consultez les Règles de confidentialité du développeur.

Ce développeur déclare que vos données :

  • Ne seront pas vendues à des tiers en dehors des cas d'utilisation approuvés.
  • Ne seront ni utilisées ni transférées à des fins sans rapport avec la fonctionnalité de base de l'article.
  • Ne seront ni utilisées ni transférées pour déterminer votre solvabilité ou en vue de vous proposer un prêt.

Assistance

Pour obtenir de l'aide concernant des questions, des suggestions ou des problèmes, consultez le site d'assistance du développeur.

Applications Google