• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 14:47
CEST 20:47
KST 03:47
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
Maestros of the Game: Live Finals Preview (RO4)0TL.net Map Contest #21 - Finalists4Team TLMC #5: Vote to Decide Ladder Maps!0[ASL20] Ro8 Preview Pt1: Mile High15Team TLMC #5 - Finalists & Open Tournaments2
Community News
herO joins T119Artosis vs Ret Showmatch27Classic wins RSL Revival Season 22Weekly Cups (Sept 15-21): herO Goes For Four2SC2 5.0.15 PTR Patch Notes + Sept 22nd update290
StarCraft 2
General
Storm change is a essentially a strict buff on PTR herO joins T1 Maestros of the Game: Live Finals Preview (RO4) SC2 5.0.15 PTR Patch Notes + Sept 22nd update SHIN's Feedback to Current PTR (9/24/2025)
Tourneys
SC2's Safe House 2 - October 18 & 19 Maestros of The Game—$20k event w/ live finals in Paris Master Swan Open (Global Bronze-Master 2) Sparkling Tuna Cup - Weekly Open Tournament Prome's Evo #1 - Solar vs Classic (SC: Evo)
Strategy
Custom Maps
External Content
Mutation # 492 Get Out More Mutation # 491 Night Drive Mutation # 490 Masters of Midnight Mutation # 489 Bannable Offense
Brood War
General
ASL20 General Discussion Artosis vs Ret Showmatch StarCraft 1 Beta Test (Video) BGH Auto Balance -> http://bghmmr.eu/ Whose hotkey signature is this?
Tourneys
[ASL20] Ro8 Day 1 [ASL20] Ro8 Day 2 [Megathread] Daily Proleagues Small VOD Thread 2.0
Strategy
Simple Questions, Simple Answers Muta micro map competition
Other Games
General Games
Nintendo Switch Thread The XBox Thread Path of Exile Stormgate/Frost Giant Megathread Beyond All Reason
Dota 2
Official 'what is Dota anymore' discussion LiquidDota to reintegrate into TL.net
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread
Community
General
US Politics Mega-thread Russo-Ukrainian War Thread Things Aren’t Peaceful in Palestine The Big Programming Thread Trading/Investing Thread
Fan Clubs
The herO Fan Club! The Happy Fan Club!
Media & Entertainment
Anime Discussion Thread Movie Discussion! [Manga] One Piece
Sports
2024 - 2026 Football Thread Formula 1 Discussion TeamLiquid Health and Fitness Initiative For 2023 MLB/Baseball 2023
World Cup 2022
Tech Support
SC2 Client Relocalization [Change SC2 Language] Linksys AE2500 USB WIFI keeps disconnecting Computer Build, Upgrade & Buying Resource Thread
TL Community
BarCraft in Tokyo Japan for ASL Season5 Final The Automated Ban List
Blogs
TL Chill? More like Zero Ch…
Peanutsc
Try to reverse getting fired …
Garnet
[ASL20] Players bad at pi…
pullarius1
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1373 users

Capitalization on Blizzard Passwords - Page 5

Forum Index > SC2 General
Post a Reply
Prev 1 2 3 4 5 6 Next All
ShadowWolf
Profile Joined March 2010
United States197 Posts
July 19 2011 19:37 GMT
#81
On July 20 2011 04:23 Dental Floss wrote:
Show nested quote +
On July 20 2011 04:17 noobinator wrote:
On July 20 2011 03:42 Ramuh wrote:
It doesn't matter. You almost can't bruteforce passwords over network, it just does too damn long. while capitalization doubles the number of possible passwords (well not exactly, but you get the point) bruteforcing it is not an option.

I guarantee you that 99,9 % of so called "hacked" accounts are from keyloggers, phishing sites, trojans and such stuff

http://imgur.com/gallery/YWFLq substitute viruses with hacks and you're about right

Quick Math:
26 chars, 6 char password length, and assuming you can try 100 passwords per second you

26^6 / 100 / 60 / 60 / 24 = 35 days for bruteforcing a 6(!) char password. And thats assuming blizzard lets you bombard their servers.

You forgot numbers

6 char password would be 36 possible chars, so 251 days. GG hackers, mine would take more than your lifetime.

EDIT: 10 char password would take 1,159,360 years.


Yes...251 days with that hypothetical rate. However, modern computers can calculate 2,000,000,000 hashes PER SECOND. Your 6 char password would then take 1.5 seconds to break.


This is relevant if they have the hash through some type of sniffing - which is probably one technique used to gather passwords and hack accounts. However, the Blizzard system automatically locks you out if you try too many passwords too quickly, so you're time-limited. Obviously if you have already have the hash then the time to brute for it is inconsequential as long as you're using something for which they have a prebuilt hash.
DrBoo
Profile Joined April 2010
Canada1177 Posts
July 19 2011 19:38 GMT
#82
Seems like a brilliant plan... so they can sell more authenticators
"DrBoo is an elaborate troll" -Pufftrees
celious
Profile Joined September 2009
United States195 Posts
July 19 2011 19:41 GMT
#83

Low level targets like senate.gov or nintendo.com? navy.mil or citibank.com? Blizzard isn't some invincible titan. There is literally no reason to arbitrarily reduce the number of possible passwords.

Nintendo and Citibank hacks were not LulzSec. Citibank had a flaw in software that was audited by a 3rd party that contract obviously came to an end And the navy site well who knows what happened there all they did was release a screenshot of some garbage injected into their job listing page. Companies such as facebook, google, and blizzard have millions of users, high profile targets and none of which have been mined yet as far as we know and good luck to any hacker that attempts the feat.

Google has been attacked a few times but nothing incredibly serious.
DJFaqU
Profile Joined May 2011
466 Posts
July 19 2011 19:42 GMT
#84
On July 20 2011 04:23 Dental Floss wrote:
Show nested quote +
On July 20 2011 04:17 noobinator wrote:
On July 20 2011 03:42 Ramuh wrote:
It doesn't matter. You almost can't bruteforce passwords over network, it just does too damn long. while capitalization doubles the number of possible passwords (well not exactly, but you get the point) bruteforcing it is not an option.

I guarantee you that 99,9 % of so called "hacked" accounts are from keyloggers, phishing sites, trojans and such stuff

http://imgur.com/gallery/YWFLq substitute viruses with hacks and you're about right

Quick Math:
26 chars, 6 char password length, and assuming you can try 100 passwords per second you

26^6 / 100 / 60 / 60 / 24 = 35 days for bruteforcing a 6(!) char password. And thats assuming blizzard lets you bombard their servers.

You forgot numbers

6 char password would be 36 possible chars, so 251 days. GG hackers, mine would take more than your lifetime.

EDIT: 10 char password would take 1,159,360 years.


Yes...251 days with that hypothetical rate. However, modern computers can calculate 2,000,000,000 hashes PER SECOND. Your 6 char password would then take 1.5 seconds to break.


Also cloud time and time on botnets is cheap as FUCK.
Chill
Profile Blog Joined January 2005
Calgary25983 Posts
July 19 2011 19:42 GMT
#85
On July 20 2011 04:32 Dental Floss wrote:
Show nested quote +
On July 20 2011 04:29 celious wrote:
On July 20 2011 04:25 Bobbias wrote:
On July 20 2011 04:09 Dental Floss wrote:
You guys are all missing the point. The problem comes when someone executes a mysql injection attack or gets access to the database that stores user data. A hacker can then use a GPU-based attack to guess and check against the hash values stored in the database without going over the network. They then have access to your email address and password. If its a common password they can basically steal your identity.


Someone with some sense. Yes, if someone were to gain access to the SQL databases with the hashed keys, they could use an attack to break the keys and get your password... Problem with thinking that 26 extra keys would help here is that they aren't actually looking for your password, they are looking for whatever password will give you that key, because there are collisions in the hash function.

Adding 26 extra keys wouldn't do too much, but would probably slow things down. Unfortunately, if they have access to the hashed passwords, and happen to have a rainbow table, things are looking pretty grim for a lot of people. This is part of why the LulzSec hacks were so bad. Not to mention that if they happen to get your password for something else (due to shoddy security practice), if you happen to use the same, or a similar password, you re in trouble, regardless of how blizz stores your password.

I urge everyone here to read up about how LulzSec managed to get their information. They exposed thousands of username and password combinations, they broke into tons of different systems, many of which were supposed to be secure.



LulzSec preformed many simple hacks against systems that weren't secure. Technically you could say everything is supposed to be secure but it obviously isn't. Also the databases that LulzSec released were of random gaming sites or low budget game developers that obviously dont have the means or resources to secure and monitor their system like companies such as Blizzard. If you've ever seen the behind the scenes WoW systems you would be amazed.


Low level targets like senate.gov or nintendo.com? navy.mil or citibank.com? Blizzard isn't some invincible titan. There is literally no reason to arbitrarily reduce the number of possible passwords.

Okay, let's move on. Most people agree that there should be capitals in the passwords - No need to fearmonger like this.
Moderator
Antylamon
Profile Joined March 2011
United States1981 Posts
Last Edited: 2011-07-19 19:46:17
July 19 2011 19:45 GMT
#86
On July 20 2011 04:41 celious wrote:
Show nested quote +

Low level targets like senate.gov or nintendo.com? navy.mil or citibank.com? Blizzard isn't some invincible titan. There is literally no reason to arbitrarily reduce the number of possible passwords.

Nintendo and Citibank hacks were not LulzSec. Citibank had a flaw in software that was audited by a 3rd party that contract obviously came to an end And the navy site well who knows what happened there all they did was release a screenshot of some garbage injected into their job listing page. Companies such as facebook, google, and blizzard have millions of users, high profile targets and none of which have been mined yet as far as we know and good luck to any hacker that attempts the feat.

Google has been attacked a few times but nothing incredibly serious.

Does anyone else feel like this post is kind of suspicious 0.o

Anyways, the senate is a pretty big target, bigger than Nintendo or even the navy. You didn't explain that in your post
Sanitys
Profile Joined April 2010
Canada126 Posts
July 19 2011 19:46 GMT
#87
Had no idea, my battle.net PW has always contained(or so I thought) capitalization. Not a big deal though my PW is still long enough and complex enough that the only way someone is going to get in is via a keylogger, in which case the capitals are irrelevant.

I just find it interesting that a company of Blizzards stature doesn't have a simple, standard feature like case sensitive passwords.
schmeebs
Profile Joined August 2010
United States115 Posts
July 19 2011 19:47 GMT
#88
On July 20 2011 04:38 DrBoo wrote:
Seems like a brilliant plan... so they can sell more authenticators

Blizzard does not make money on authenticators, they are sold essentially at cost and if you have a smartphone of ANY variety they are free.
Ygz
Profile Joined June 2010
England370 Posts
July 19 2011 19:53 GMT
#89
Definitely odd to not allow it but as long you are mixing up your passwords with numbers, it needn't be a concern.
Everything Newton said.
Erionn
Profile Joined January 2011
United States1015 Posts
July 19 2011 19:55 GMT
#90
It DEFINITELY used to be case-sensitive, 100% positive. I did notice they changed it, not sure how long. It has to be recently because I remember having to log in to another Bnet account of mine with caps just a few months ago.
Glowbox
Profile Joined June 2010
Netherlands330 Posts
July 19 2011 20:20 GMT
#91
On July 20 2011 04:23 Dental Floss wrote:
Show nested quote +
On July 20 2011 04:17 noobinator wrote:
On July 20 2011 03:42 Ramuh wrote:
It doesn't matter. You almost can't bruteforce passwords over network, it just does too damn long. while capitalization doubles the number of possible passwords (well not exactly, but you get the point) bruteforcing it is not an option.

I guarantee you that 99,9 % of so called "hacked" accounts are from keyloggers, phishing sites, trojans and such stuff

http://imgur.com/gallery/YWFLq substitute viruses with hacks and you're about right

Quick Math:
26 chars, 6 char password length, and assuming you can try 100 passwords per second you

26^6 / 100 / 60 / 60 / 24 = 35 days for bruteforcing a 6(!) char password. And thats assuming blizzard lets you bombard their servers.

You forgot numbers

6 char password would be 36 possible chars, so 251 days. GG hackers, mine would take more than your lifetime.

EDIT: 10 char password would take 1,159,360 years.


Yes...251 days with that hypothetical rate. However, modern computers can calculate 2,000,000,000 hashes PER SECOND. Your 6 char password would then take 1.5 seconds to break.


And that's why you don't use MD5/SHA-family hash functions. Here's how you do it: http://codahale.com/how-to-safely-store-a-password/ Good luck bruteforcing that!
MVega
Profile Joined November 2010
763 Posts
July 19 2011 20:29 GMT
#92
I knew about that in WoW, but I always kind of assumed that they would have changed that for SC2. Guess not. :/ They really probably should do something about that but I'm not worried as my password is quite long and contains symbols.
bumkin: How can you play like 50 games per day... I 4gate 2 times then it's nap time
vlnplyr
Profile Joined November 2010
United States76 Posts
July 19 2011 21:18 GMT
#93
On July 20 2011 04:47 schmeebs wrote:
Show nested quote +
On July 20 2011 04:38 DrBoo wrote:
Seems like a brilliant plan... so they can sell more authenticators

Blizzard does not make money on authenticators, they are sold essentially at cost and if you have a smartphone of ANY variety they are free.


This is correct. There is an iPhone app, which I have, that I use. HIGHLY recommend it if you value your account in the least bit. I suppose if you were to lose your phone AND have your account hacked by the person that stole it... but then you're just having one hell of a bad day!
www.youtube.com/vlnplyr5
Pyre
Profile Joined July 2010
United States1940 Posts
Last Edited: 2011-07-19 21:29:55
July 19 2011 21:29 GMT
#94
I would say get an authenticator. It gives peice of mind. My only beef wih it is the authenticator can be hard to read. In low light Also it can be a real hassel if you lose or break it.
zyzski
Profile Joined May 2010
United States698 Posts
Last Edited: 2011-07-19 21:36:50
July 19 2011 21:34 GMT
#95
definitely used to be case sensitive, interesting

but for real, nobody is going to go around bruteforcing your blizzard account unless it's some super decked WoW character or famous SC2 account. just be careful about showing your bnet email addy.
TYBG
BrTarolg
Profile Blog Joined June 2009
United Kingdom3574 Posts
July 20 2011 18:45 GMT
#96
The fact it used to work, and no longer works, implies they are using an insecure form of storing your password, i.e one that is most likely plaintext

GJ BLIZZARD
Furycrab
Profile Joined April 2010
Canada456 Posts
July 20 2011 20:11 GMT
#97
If they have proper systems in place to prevent password brute forcing, alternating caps won't realistically protect you more than just using a password that is not in the most popular passwords list, which I can only assume you don't if you alternate caps in your passwords.

The line of reasoning here being: If they got your PW via a number of ways, case of the PW won't change a thing, so if case doesn't change a thing but has the potential of causing frustrations it shouldn't matter all that much. NOTE: This is NOT true if the PW is for a system that could be brute forced! (In which case this adds an exponential amount of extra possibilities to your PW)


If you are really worried about security, get an authenticator.
Too tired to come up with something witty.
Lorch
Profile Joined June 2011
Germany3684 Posts
July 20 2011 20:12 GMT
#98
I'm actually quiet shocked to read this, that's a terrible think and it's just poor by blizzard given how long wow has been around.
Aberu
Profile Blog Joined April 2010
United States968 Posts
July 20 2011 20:14 GMT
#99
Case sensitivity is not some integral aspect to internet security, if your password has a decent amount of numbers and a word that isn't predictable, along with having an authenticator, it should never get hacked, and if it still does, then YOU did something wrong.
srsly
windsupernova
Profile Joined October 2010
Mexico5280 Posts
July 20 2011 20:14 GMT
#100
On July 21 2011 03:45 BrTarolg wrote:
The fact it used to work, and no longer works, implies they are using an insecure form of storing your password, i.e one that is most likely plaintext

GJ BLIZZARD


Eh? I don´t see the logic behind this. They are insecure about your password security so.... they make it laxer?
"Its easy, just trust your CPU".-Boxer on being good at games
Prev 1 2 3 4 5 6 Next All
Please log in or register to reply.
Live Events Refresh
RotterdaM Event
17:00
Stream Rumble #4 PTR Edition
RotterdaM949
IndyStarCraft 257
Liquipedia
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
RotterdaM 949
mouzHeroMarine 390
IndyStarCraft 257
UpATreeSC 121
JuggernautJason51
StarCraft: Brood War
Rain 1887
Shuttle 459
Hyuk 283
Mini 186
BeSt 185
Soulkey 179
Sexy 115
Dewaltoss 107
ggaemo 79
Hyun 61
[ Show more ]
JYJ25
HiyA 11
Sacsri 10
sorry 10
Free 6
Dota 2
Gorgc6191
qojqva3811
Super Smash Bros
Mew2King54
Other Games
Grubby1632
FrodaN949
B2W.Neo537
C9.Mang0109
QueenE75
Trikslyr62
ArmadaUGS45
NeuroSwarm31
rGuardiaN10
rubinoeu6
Organizations
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 21 non-featured ]
StarCraft 2
• Hupsaiya 26
• Adnapsc2 8
• Kozan
• sooper7s
• Migwel
• LaughNgamezSOOP
• IndyKCrew
• AfreecaTV YouTube
• intothetv
StarCraft: Brood War
• 80smullet 25
• HerbMon 2
• ZZZeroYoutube
• STPLYoutube
• BSLYoutube
Dota 2
• masondota21125
• WagamamaTV363
• lizZardDota237
League of Legends
• Nemesis2205
• Jankos1622
Other Games
• imaqtpie1066
• Shiphtur141
Upcoming Events
Maestros of the Game
17h 13m
Serral vs herO
Clem vs Reynor
[BSL 2025] Weekly
23h 13m
[BSL 2025] Weekly
23h 13m
Replay Cast
1d 15h
BSL Team Wars
2 days
Afreeca Starleague
2 days
Soma vs BeSt
Wardi Open
2 days
OSC
3 days
Sparkling Tuna Cup
3 days
Afreeca Starleague
3 days
Bisu vs Larva
[ Show More ]
LiuLi Cup
4 days
OSC
4 days
The PondCast
5 days
Wardi Open
6 days
Liquipedia Results

Completed

2025 Chongqing Offline CUP
RSL Revival: Season 2
HCC Europe

Ongoing

BSL 20 Team Wars
KCM Race Survival 2025 Season 3
BSL 21 Points
ASL Season 20
CSL 2025 AUTUMN (S18)
Maestros of the Game
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual
Esports World Cup 2025
BLAST Bounty Fall 2025
BLAST Bounty Fall Qual
IEM Cologne 2025
FISSURE Playground #1

Upcoming

IPSL Winter 2025-26
SC4ALL: Brood War
BSL 21 Team A
BSL Season 21
RSL Revival: Season 3
Stellar Fest
SC4ALL: StarCraft II
WardiTV TLMC #15
EC S1
ESL Impact League Season 8
SL Budapest Major 2025
BLAST Rivals Fall 2025
IEM Chengdu 2025
PGL Masters Bucharest 2025
Thunderpick World Champ.
CS Asia Championships 2025
ESL Pro League S22
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.