• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 14:47
CEST 20:47
KST 03:47
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
Maestros of the Game: Live Finals Preview (RO4)0TL.net Map Contest #21 - Finalists4Team TLMC #5: Vote to Decide Ladder Maps!0[ASL20] Ro8 Preview Pt1: Mile High15Team TLMC #5 - Finalists & Open Tournaments2
Community News
herO joins T119Artosis vs Ret Showmatch27Classic wins RSL Revival Season 22Weekly Cups (Sept 15-21): herO Goes For Four2SC2 5.0.15 PTR Patch Notes + Sept 22nd update290
StarCraft 2
General
Storm change is a essentially a strict buff on PTR herO joins T1 Maestros of the Game: Live Finals Preview (RO4) SC2 5.0.15 PTR Patch Notes + Sept 22nd update SHIN's Feedback to Current PTR (9/24/2025)
Tourneys
SC2's Safe House 2 - October 18 & 19 Maestros of The Game—$20k event w/ live finals in Paris Master Swan Open (Global Bronze-Master 2) Sparkling Tuna Cup - Weekly Open Tournament Prome's Evo #1 - Solar vs Classic (SC: Evo)
Strategy
Custom Maps
External Content
Mutation # 492 Get Out More Mutation # 491 Night Drive Mutation # 490 Masters of Midnight Mutation # 489 Bannable Offense
Brood War
General
ASL20 General Discussion Artosis vs Ret Showmatch StarCraft 1 Beta Test (Video) BGH Auto Balance -> http://bghmmr.eu/ Whose hotkey signature is this?
Tourneys
[ASL20] Ro8 Day 1 [ASL20] Ro8 Day 2 [Megathread] Daily Proleagues Small VOD Thread 2.0
Strategy
Simple Questions, Simple Answers Muta micro map competition
Other Games
General Games
Nintendo Switch Thread The XBox Thread Path of Exile Stormgate/Frost Giant Megathread Beyond All Reason
Dota 2
Official 'what is Dota anymore' discussion LiquidDota to reintegrate into TL.net
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread
Community
General
US Politics Mega-thread Russo-Ukrainian War Thread Things Aren’t Peaceful in Palestine The Big Programming Thread Trading/Investing Thread
Fan Clubs
The herO Fan Club! The Happy Fan Club!
Media & Entertainment
Anime Discussion Thread Movie Discussion! [Manga] One Piece
Sports
2024 - 2026 Football Thread Formula 1 Discussion TeamLiquid Health and Fitness Initiative For 2023 MLB/Baseball 2023
World Cup 2022
Tech Support
SC2 Client Relocalization [Change SC2 Language] Linksys AE2500 USB WIFI keeps disconnecting Computer Build, Upgrade & Buying Resource Thread
TL Community
BarCraft in Tokyo Japan for ASL Season5 Final The Automated Ban List
Blogs
TL Chill? More like Zero Ch…
Peanutsc
Try to reverse getting fired …
Garnet
[ASL20] Players bad at pi…
pullarius1
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1373 users

Capitalization on Blizzard Passwords - Page 4

Forum Index > SC2 General
Post a Reply
Prev 1 2 3 4 5 6 Next All
tok
Profile Joined April 2010
United States691 Posts
July 19 2011 19:04 GMT
#61
Key logging has been apparent in almost all Blizzard games. World of Warcraft seems to be hit the most because of key logging programs hidden in addons that are common in the game. I think blizzard should indeed make passwords case sensitive in addition to adding a log in on screen keyboard that is randomly generated each click, a little excessive I know but security is important.
RaLakedaimon
Profile Joined August 2010
United States1564 Posts
July 19 2011 19:04 GMT
#62
I noticed this after release but thought maybe it was widely known and yeah it certainly is a stupid way to run things given all the people in WoW getting there account hijacked, just another glimpse at how Blizzard likes to do things I suppose. I guess you just gotta be smart about making the most long ass strange password you can that nobody would ever think of, but that's assuming there not stealing it through more standard means in which case I think your screwed either way.
Nagano
Profile Blog Joined July 2010
United States1157 Posts
July 19 2011 19:06 GMT
#63
On July 20 2011 03:42 Gheed wrote:
Show nested quote +
On July 20 2011 03:39 Nagano wrote:
Interesting note: BW bnet1.0 was case-sensitive.


No, original battle.net passwords are not case sensitive, either. I just tested it using Warcraft 3.


Hum, yea you're right, I just tested it on BW bnet. I guess back in the day it was case-sensitive, because I had a case-sensitive password that I could never remember the exact capitalization of, and always took me like 5 minutes to log in.
“The illiterate of the 21st century will not be those who cannot read and write, but those who cannot learn, unlearn, and relearn.”
zhurai
Profile Blog Joined September 2010
United States5660 Posts
July 19 2011 19:07 GMT
#64
wow. blizzard, do you have any idea what security is ~_~
Twitter: @zhurai | Site: http://zhurai.com
windsupernova
Profile Joined October 2010
Mexico5280 Posts
July 19 2011 19:08 GMT
#65
I can´t believe how big of a deal many people are making out of this.

This is not a huge deal, if you are worried about your password safety:

1.- Use long passwords, not common words and combine numbers and Symbols.
2.-Don´t use the same password for everything.
3.- Don´t fall for social engineering scams}
4.-Don´t download shady software.


All of above is much more important than, caps sensitive passwords. Gosh, I can´t believe how many people just want to get angry for the sake of getting angry(not directed at the OP he had good intentions in informing us but it really its not a big deal).


"Its easy, just trust your CPU".-Boxer on being good at games
Dental Floss
Profile Joined September 2009
United States1015 Posts
July 19 2011 19:09 GMT
#66
You guys are all missing the point. The problem comes when someone executes a mysql injection attack or gets access to the database that stores user data. A hacker can then use a GPU-based attack to guess and check against the hash values stored in the database without going over the network. They then have access to your email address and password. If its a common password they can basically steal your identity.
Kim Tae Gyun.... never forget Perfectman RIP
Skaff
Profile Joined February 2010
United States240 Posts
July 19 2011 19:12 GMT
#67
Still an odd line of defense to just neglect.. However most comments about brute force attacks are correct. They would take forever and bnet will already cut you out after so many failed attempts.

The authenticator is a great tool but it does have some issues. I personally used the physical key chain authenticator for a period of time (I did not have a smart phone yet). However, it become more of a pain over time. It eventually lost sync with bnet and it was generally 30 - 60 seconds ahead of bnet. (would have to start login, wait 30 - 60 seconds between putting in key and logging in) Though, the mobile version has other sync features the physical device does not.
Ramuh
Profile Joined February 2011
Germany238 Posts
July 19 2011 19:13 GMT
#68
On July 20 2011 04:09 Dental Floss wrote:
You guys are all missing the point. The problem comes when someone executes a mysql injection attack or gets access to the database that stores user data. A hacker can then use a GPU-based attack to guess and check against the hash values stored in the database without going over the network. They then have access to your email address and password. If its a common password they can basically steal your identity.


if something like this would happend to blizzard they would close down servers in the blink of an eye and make sure everyone would need too change their pw with whatever method.

Plus im almost certain their passwords are salted and stuff, making their passwords more secure
Torte de Lini
Profile Blog Joined September 2010
Germany38463 Posts
July 19 2011 19:13 GMT
#69
On July 20 2011 04:08 windsupernova wrote:
I can´t believe how big of a deal many people are making out of this.

This is not a huge deal, if you are worried about your password safety:

1.- Use long passwords, not common words and combine numbers and Symbols.
2.-Don´t use the same password for everything.
3.- Don´t fall for social engineering scams}
4.-Don´t download shady software.


All of above is much more important than, caps sensitive passwords. Gosh, I can´t believe how many people just want to get angry for the sake of getting angry(not directed at the OP he had good intentions in informing us but it really its not a big deal).




Point being that their extensive form of protection is completely overlooked.
https://twitter.com/#!/TorteDeLini (@TorteDeLini)
TelecoM
Profile Blog Joined January 2010
United States10679 Posts
July 19 2011 19:14 GMT
#70
It must of been a recent change because My pw has always been case sensitive and if I didn't type it in exactly , it wouldn't work
AKA: TelecoM[WHITE] Protoss fighting
zhurai
Profile Blog Joined September 2010
United States5660 Posts
July 19 2011 19:16 GMT
#71
you know, the other thing that pissed me off, is that I couldn't actually like... use punctuation in the passwords either. which increases security by _a lot_ (like period, commas, etc) = =
Twitter: @zhurai | Site: http://zhurai.com
Antylamon
Profile Joined March 2011
United States1981 Posts
Last Edited: 2011-07-19 19:20:26
July 19 2011 19:17 GMT
#72
On July 20 2011 03:42 Ramuh wrote:
It doesn't matter. You almost can't bruteforce passwords over network, it just does too damn long. while capitalization doubles the number of possible passwords (well not exactly, but you get the point) bruteforcing it is not an option.

I guarantee you that 99,9 % of so called "hacked" accounts are from keyloggers, phishing sites, trojans and such stuff

http://imgur.com/gallery/YWFLq substitute viruses with hacks and you're about right

Quick Math:
26 chars, 6 char password length, and assuming you can try 100 passwords per second you

26^6 / 100 / 60 / 60 / 24 = 35 days for bruteforcing a 6(!) char password. And thats assuming blizzard lets you bombard their servers.

You forgot numbers

6 char password would be 36 possible chars, so 251 days. GG hackers, mine would take more than your lifetime.

EDIT: 10 char password would take 1,159,360 years.
Dental Floss
Profile Joined September 2009
United States1015 Posts
July 19 2011 19:21 GMT
#73
On July 20 2011 04:13 Ramuh wrote:
Show nested quote +
On July 20 2011 04:09 Dental Floss wrote:
You guys are all missing the point. The problem comes when someone executes a mysql injection attack or gets access to the database that stores user data. A hacker can then use a GPU-based attack to guess and check against the hash values stored in the database without going over the network. They then have access to your email address and password. If its a common password they can basically steal your identity.


if something like this would happend to blizzard they would close down servers in the blink of an eye and make sure everyone would need too change their pw with whatever method.

Plus im almost certain their passwords are salted and stuff, making their passwords more secure


Thats not how it works. Such attacks are common-place against banks and major corporations. You get no warning, and once you find out its too late. Modern GPUs can crack passwords hundreds if not thousands of times faster than CPUs. See bitcoin mining for more information about parallel hash-checking.
Kim Tae Gyun.... never forget Perfectman RIP
Kralic
Profile Blog Joined March 2010
Canada2628 Posts
July 19 2011 19:21 GMT
#74
Here is the Blizzard employee's posts explaining the reasoning behind it.

http://us.battle.net/wow/en/forum/topic/1869566296#2
http://us.battle.net/wow/en/forum/topic/1658712043?page=2#21

It is not a big deal. I said this before and I stand beside it.
Brood War forever!
celious
Profile Joined September 2009
United States195 Posts
July 19 2011 19:22 GMT
#75
On July 20 2011 04:04 tok wrote:
Key logging has been apparent in almost all Blizzard games. World of Warcraft seems to be hit the most because of key logging programs hidden in addons that are common in the game. I think blizzard should indeed make passwords case sensitive in addition to adding a log in on screen keyboard that is randomly generated each click, a little excessive I know but security is important.



Lol you cannot hide keyloggers in addons because LUA cannot execute another process.


back to topic having case sensitive passwords increases difficulty of brute forcing a password which in all honesty is difficult to do these days because accounts are locked after so many attempts like 10 I think? And it doesn't matter if they use proxies or not the account still becomes locked.

Just avoid simple easy to guess passwords and don't reuse passwords and you'll be fine
Dental Floss
Profile Joined September 2009
United States1015 Posts
Last Edited: 2011-07-19 19:26:30
July 19 2011 19:23 GMT
#76
On July 20 2011 04:17 noobinator wrote:
Show nested quote +
On July 20 2011 03:42 Ramuh wrote:
It doesn't matter. You almost can't bruteforce passwords over network, it just does too damn long. while capitalization doubles the number of possible passwords (well not exactly, but you get the point) bruteforcing it is not an option.

I guarantee you that 99,9 % of so called "hacked" accounts are from keyloggers, phishing sites, trojans and such stuff

http://imgur.com/gallery/YWFLq substitute viruses with hacks and you're about right

Quick Math:
26 chars, 6 char password length, and assuming you can try 100 passwords per second you

26^6 / 100 / 60 / 60 / 24 = 35 days for bruteforcing a 6(!) char password. And thats assuming blizzard lets you bombard their servers.

You forgot numbers

6 char password would be 36 possible chars, so 251 days. GG hackers, mine would take more than your lifetime.

EDIT: 10 char password would take 1,159,360 years.


Yes...251 days with that hypothetical rate. However, modern computers can calculate 2,000,000,000 hashes PER SECOND. Your 6 char password would then take 1.5 seconds to break.
Kim Tae Gyun.... never forget Perfectman RIP
Bobbias
Profile Blog Joined March 2008
Canada1373 Posts
July 19 2011 19:25 GMT
#77
On July 20 2011 04:09 Dental Floss wrote:
You guys are all missing the point. The problem comes when someone executes a mysql injection attack or gets access to the database that stores user data. A hacker can then use a GPU-based attack to guess and check against the hash values stored in the database without going over the network. They then have access to your email address and password. If its a common password they can basically steal your identity.


Someone with some sense. Yes, if someone were to gain access to the SQL databases with the hashed keys, they could use an attack to break the keys and get your password... Problem with thinking that 26 extra keys would help here is that they aren't actually looking for your password, they are looking for whatever password will give you that key, because there are collisions in the hash function.

Adding 26 extra keys wouldn't do too much, but would probably slow things down. Unfortunately, if they have access to the hashed passwords, and happen to have a rainbow table, things are looking pretty grim for a lot of people. This is part of why the LulzSec hacks were so bad. Not to mention that if they happen to get your password for something else (due to shoddy security practice), if you happen to use the same, or a similar password, you re in trouble, regardless of how blizz stores your password.

I urge everyone here to read up about how LulzSec managed to get their information. They exposed thousands of username and password combinations, they broke into tons of different systems, many of which were supposed to be secure.
celious
Profile Joined September 2009
United States195 Posts
July 19 2011 19:29 GMT
#78
On July 20 2011 04:25 Bobbias wrote:
Show nested quote +
On July 20 2011 04:09 Dental Floss wrote:
You guys are all missing the point. The problem comes when someone executes a mysql injection attack or gets access to the database that stores user data. A hacker can then use a GPU-based attack to guess and check against the hash values stored in the database without going over the network. They then have access to your email address and password. If its a common password they can basically steal your identity.


Someone with some sense. Yes, if someone were to gain access to the SQL databases with the hashed keys, they could use an attack to break the keys and get your password... Problem with thinking that 26 extra keys would help here is that they aren't actually looking for your password, they are looking for whatever password will give you that key, because there are collisions in the hash function.

Adding 26 extra keys wouldn't do too much, but would probably slow things down. Unfortunately, if they have access to the hashed passwords, and happen to have a rainbow table, things are looking pretty grim for a lot of people. This is part of why the LulzSec hacks were so bad. Not to mention that if they happen to get your password for something else (due to shoddy security practice), if you happen to use the same, or a similar password, you re in trouble, regardless of how blizz stores your password.

I urge everyone here to read up about how LulzSec managed to get their information. They exposed thousands of username and password combinations, they broke into tons of different systems, many of which were supposed to be secure.



LulzSec preformed many simple hacks against systems that weren't secure. Technically you could say everything is supposed to be secure but it obviously isn't. Also the databases that LulzSec released were of random gaming sites or low budget game developers that obviously dont have the means or resources to secure and monitor their system like companies such as Blizzard. If you've ever seen the behind the scenes WoW systems you would be amazed.
Dental Floss
Profile Joined September 2009
United States1015 Posts
Last Edited: 2011-07-19 19:32:51
July 19 2011 19:32 GMT
#79
On July 20 2011 04:29 celious wrote:
Show nested quote +
On July 20 2011 04:25 Bobbias wrote:
On July 20 2011 04:09 Dental Floss wrote:
You guys are all missing the point. The problem comes when someone executes a mysql injection attack or gets access to the database that stores user data. A hacker can then use a GPU-based attack to guess and check against the hash values stored in the database without going over the network. They then have access to your email address and password. If its a common password they can basically steal your identity.


Someone with some sense. Yes, if someone were to gain access to the SQL databases with the hashed keys, they could use an attack to break the keys and get your password... Problem with thinking that 26 extra keys would help here is that they aren't actually looking for your password, they are looking for whatever password will give you that key, because there are collisions in the hash function.

Adding 26 extra keys wouldn't do too much, but would probably slow things down. Unfortunately, if they have access to the hashed passwords, and happen to have a rainbow table, things are looking pretty grim for a lot of people. This is part of why the LulzSec hacks were so bad. Not to mention that if they happen to get your password for something else (due to shoddy security practice), if you happen to use the same, or a similar password, you re in trouble, regardless of how blizz stores your password.

I urge everyone here to read up about how LulzSec managed to get their information. They exposed thousands of username and password combinations, they broke into tons of different systems, many of which were supposed to be secure.



LulzSec preformed many simple hacks against systems that weren't secure. Technically you could say everything is supposed to be secure but it obviously isn't. Also the databases that LulzSec released were of random gaming sites or low budget game developers that obviously dont have the means or resources to secure and monitor their system like companies such as Blizzard. If you've ever seen the behind the scenes WoW systems you would be amazed.


Low level targets like senate.gov or nintendo.com? navy.mil or citibank.com? Blizzard isn't some invincible titan. There is literally no reason to arbitrarily reduce the number of possible passwords.
Kim Tae Gyun.... never forget Perfectman RIP
Losiff
Profile Joined April 2011
8 Posts
July 19 2011 19:36 GMT
#80
A wild guess, they turned it off, because their customer service got flooded by messages from noob wow-players who had their caps lock on.

This doesnt really make it any less secure. Maybe if somebody has a password "pAsswORd", this would change it from almost guessable to guessable.
Prev 1 2 3 4 5 6 Next All
Please log in or register to reply.
Live Events Refresh
RotterdaM Event
17:00
Stream Rumble #4 PTR Edition
RotterdaM949
IndyStarCraft 257
Liquipedia
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
RotterdaM 949
mouzHeroMarine 390
IndyStarCraft 257
UpATreeSC 121
JuggernautJason51
StarCraft: Brood War
Rain 1887
Shuttle 459
Hyuk 283
Mini 186
BeSt 185
Soulkey 179
Sexy 115
Dewaltoss 107
ggaemo 79
Hyun 61
[ Show more ]
JYJ25
HiyA 11
Sacsri 10
sorry 10
Free 6
Dota 2
Gorgc6191
qojqva3811
Super Smash Bros
Mew2King54
Other Games
Grubby1632
FrodaN949
B2W.Neo537
C9.Mang0109
QueenE75
Trikslyr62
ArmadaUGS45
NeuroSwarm31
rGuardiaN10
rubinoeu6
Organizations
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 21 non-featured ]
StarCraft 2
• Hupsaiya 26
• Adnapsc2 8
• Kozan
• sooper7s
• Migwel
• LaughNgamezSOOP
• IndyKCrew
• AfreecaTV YouTube
• intothetv
StarCraft: Brood War
• 80smullet 25
• HerbMon 2
• ZZZeroYoutube
• STPLYoutube
• BSLYoutube
Dota 2
• masondota21125
• WagamamaTV363
• lizZardDota237
League of Legends
• Nemesis2205
• Jankos1622
Other Games
• imaqtpie1066
• Shiphtur141
Upcoming Events
Maestros of the Game
17h 13m
Serral vs herO
Clem vs Reynor
[BSL 2025] Weekly
23h 13m
[BSL 2025] Weekly
23h 13m
Replay Cast
1d 15h
BSL Team Wars
2 days
Afreeca Starleague
2 days
Soma vs BeSt
Wardi Open
2 days
OSC
3 days
Sparkling Tuna Cup
3 days
Afreeca Starleague
3 days
Bisu vs Larva
[ Show More ]
LiuLi Cup
4 days
OSC
4 days
The PondCast
5 days
Wardi Open
6 days
Liquipedia Results

Completed

2025 Chongqing Offline CUP
RSL Revival: Season 2
HCC Europe

Ongoing

BSL 20 Team Wars
KCM Race Survival 2025 Season 3
BSL 21 Points
ASL Season 20
CSL 2025 AUTUMN (S18)
Maestros of the Game
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual
Esports World Cup 2025
BLAST Bounty Fall 2025
BLAST Bounty Fall Qual
IEM Cologne 2025
FISSURE Playground #1

Upcoming

IPSL Winter 2025-26
SC4ALL: Brood War
BSL 21 Team A
BSL Season 21
RSL Revival: Season 3
Stellar Fest
SC4ALL: StarCraft II
WardiTV TLMC #15
EC S1
ESL Impact League Season 8
SL Budapest Major 2025
BLAST Rivals Fall 2025
IEM Chengdu 2025
PGL Masters Bucharest 2025
Thunderpick World Champ.
CS Asia Championships 2025
ESL Pro League S22
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.