Time2Crack

Password analysis

What if a hacker went after your password? Type it to see how long it would hold up.

Switch to airplane mode. Type anyway.

It works. Nothing leaves.

The analysis runs entirely in your browser.

How to verify
  1. Open F12 → Network tab (desktop)
  2. Type any password
  3. No request to time2crack.eu appears

One exception: HaveIBeenPwned receives 5 anonymised characters of your password hash — never the password itself.

Publicly auditable on Codeberg →

Crack time results

12× RTX 4090 GPUs
~100 GPUs

Heatmap

Analyse

Entropy

Length + Variety + Unpredictability

Structure

L'arrangement des caractères est-il reconnaissable ?

Votre mot de passe a-t-il déjà été piraté ?

Leaked

Have I Been Pwned

RockYou

Click to check · 17 MB download

Crack time by attack type and hashing algorithm

Crack time by attack type and hashing algorithm

Mobile/tablet: choose attack context, then scroll the attack list.

Calibration: standard
Fastest attack
Descriptions des types d'attaque

Everything about attack types

Brute Force

Teste tous les caractères possibles séquentiellement (aaa, aab, aac...). Extrêmement lent pour les longs mots de passe mais ne dépend d'aucune connaissance préalable. Vitesse : O(charset^length).

Dictionary Attack

Teste des mots courants et des variantes contre une base de ~14 milliards de mots de passe leakés (HIBP). Très efficace si le mot de passe contient des mots du dictionnaire. Vitesse : O(wordlist_size).

Hybrid Attack

Combine dictionnaire + mutations basées sur des règles (capitalization, number substitution, special characters). Ex: "password" → "P@ssw0rd!", "PASSWORD123", etc. Très efficace pour les mots avec modifications prévisibles.

Rule-based Advanced

Applies large mutation rule sets (best64/jumbo-style) to dictionary candidates. Captures realistic human edits better than simple hybrid rules.

PRINCE Chaining

Chains frequent fragments into many probable combinations (PRINCE). Very effective for passphrase-like or multi-token passwords.

Mask Attack

Cible les structures prévisibles (Uppercase + lowercase + digits + symbols dans des positions connues). Ex: "Name123!" ou "CapsWord+digits". Exploite les patterns humains courants.

Rainbow Table

Lookup instantané sur des tables pré-calculées de hashes (MD5, SHA-1, NTLM). Très rapide mais nécessite : (1) hashes non-salés, (2) tables déjà construites (~150 GB). Ineffectif contre bcrypt/Argon2id (salés et lents).

Password Spraying

Teste les mots de passe les plus courants (top 1000) contre BEAUCOUP de comptes/emails. Ex: tester "123456", "password", "qwerty" sur 1 million d'emails. Très efficace pour les mots faibles à grande échelle.

Targeted OSINT

Builds guesses from personal context (names, dates, org terms, handles). Highly effective when attacker knows the target.

Markov Attack

Utilise des chaînes de Markov pour prédire les séquences de caractères probables selon les patterns observés dans les mots de passe leakés. Privilégie les combinaisons statistiquement courantes. Efficace contre les structures "humaines".

Neural Guessing

Prioritizes guesses using learned distributions from leaked passwords (PassGAN/transformer style), often outperforming manual rule order.

PCFG (Probabilistic Context-Free Grammar)

Exploite les structures grammaticales des mots de passe (Word+digits+symbol, Uppercase+lowercase, etc.). Teste d'abord les structures les plus probables. Peut craquer "excellent" (72 bits) en ~1 sec même si brute force prend 2^72 ans. Très puissant contre structures prévisibles.

Combinator Attack

Concatène 2 mots du dictionnaire (passphrases). Ex: "correcthorsebatterystaple" = "correct" + "horse" + "battery" + "staple". Efficace contre les paraphrases qui semblent fortes mais combinent peu de mots.

Morphological Variants

Explores linguistic variants: accents, inflections, transliterations, and near-language substitutions around dictionary roots.
Methodology and sources

Sources

  • Wheeler, D. (2016). "zxcvbn: Low-Budget Password Strength Estimation"USENIX Security '16 — peer-reviewed.
    usenix.org
  • Hive Systems — Password Table 2025Hashcat benchmarks 12× RTX 4090, bcrypt.
    hivesystems.com
  • Kaspersky (2024). 193M passwords study45% cracked in < 1 min.
    securelist.com
  • Saputra et al. (2025). "Password Strength Study Using Zxcvbn…"Pilar Nusa Mandiri, Vol. 21 No. 1.
    ResearchGate
  • Hashcat Benchmarks RTX 4090 (Chick3nman)
    GitHub Gist
  • Hashcat Wiki — Rule-based AttackComprehensive rule engine reference (best64-compatible functions and optimization constraints).
    hashcat.net
  • Steube, J. — PRINCE ProcessorOfficial implementation and algorithm notes for PRINCE chained candidate generation.
    GitHub
  • Hitaj et al. (2019). "PassGAN: A Deep Learning Approach for Password Guessing"Neural password guessing outperforming manual rule systems on leaked datasets.
    arXiv.org
  • CUPP (Common User Passwords Profiler)Widely used OSINT-driven targeted password candidate generator.
    GitHub
  • PACK (Password Analysis and Cracking Kit)Statistical tooling for rule generation and morphological/transformational password candidate analysis.
    GitHub
  • Have I Been Pwned (Troy Hunt)14B+ compromised credentials.
    haveibeenpwned.com
  • Gosney, J. (2016). "8× GTX 1080 Hashcat Benchmarks"Sagitta Brutalis system — 334 GH/s NTLM, first to break 330 GH/s.
    GitHub Gist
  • Pasquini et al. (2021). "Reducing Bias in Modeling Real-world Password Strength"USENIX Security '21 — Deep learning analysis of advanced attacker capabilities.
    arXiv.org
  • Amazon Web Services (2024). "EC2 P4d Instances"Cloud GPU clusters — Thousands of A100 GPUs for professional-scale attacks.
    aws.amazon.com
  • Sprengers, M. (2011). "GPU-Based Password Cracking"Master's thesis, Radboud University — Academic baseline for GPU performance.
    Radboud University
  • Hatzivasilis & Papaefstathiou (2015). "Password Hashing Competition"Multi-GPU cracking efficiency analysis.
    IACR ePrint
  • Weir et al. (2009). "Password Cracking Using Probabilistic Context-Free Grammars"IEEE S&P — PCFG model, grammar structure derivation, Table II: 28.4% crack rate at 10^9 guesses.
    IEEE Xplore
  • Ma et al. (2014). "A Study of Probabilistic Password Models"IEEE S&P — Measured hybrid attack keyspace: top-1000 passwords cracked within ~450 guesses (best64 rules).
    IEEE Xplore
  • Dürmuth et al. (2015). "OMEN: Ordered Markov ENumerator"ESORICS — Measured Markov order-5 reduction: 94^8 keyspace → ~6.8×10^9 candidates on RockYou 14M (factor 0.006).
    Springer
  • Bonneau et al. (2012). "The Science of Guessing"IEEE S&P — OSINT-driven attacks generate 10^3–10^5 usable candidates; credential stuffing hit rate 2–5%.
    IEEE Xplore
  • Veras et al. (2012). "Visualizing Keyboard Pattern Passwords"VIZSEC — Keyboard walks in RockYou: forward 1.28%, reverse 0.18%, diagonal 0.31% of corpus.
    ACM DL
  • Gosney, J. (2012). "Exploiting Password Reuse on the Internet"Passwordscon — best64 rule set: 64 rules × 3.5M wordlist = 224M guesses, covers majority of rule-based cracking.
    Passwordscon 2012