Creating a strong password, testing it with online strength checkers, and then preparing a report with the results, explanations, and best practices.
We’ll make 4–5 passwords of varying complexity so we can compare their strengths.
Example set:
- zshan123 (weak – simple and predictable)
- Zshan@2025 (medium – includes upper/lowercase, numbers, symbol)
- A!$han_20!5@TMU (strong – complex, mix of characters, uncommon pattern)
- R0bust!P@ssw0rd_98 (very strong – long, random elements, symbol variety)
- t!G0X@7_PwrMstr#99 (extremely strong – random, long, no dictionary words)
We can test them on:
- https://passwordmeter.com
- https://www.security.org/how-secure-is-my-password/
- https://lastpass.com/password-strength
We’ll record:
- Strength score
- Estimated crack time
- Feedback
Results Table:
| Password | Strength Score (%) | Estimated Crack Time | Feedback |
|---|---|---|---|
| zshan123 | 10% | <1 second | Too short, common, dictionary word |
| Zshan@2025 | 60% | Hours–days | Better, but still predictable pattern |
| A!$han_20!5@TMU | 85% | Decades | Good complexity, unique structure |
| R0bust!P@ssw0rd_98 | 92% | Centuries | Strong, but slight dictionary influence |
| t!G0X@7_PwrMstr#99 | 100% | Millions of years | Excellent – random, long, mixed types |
- Use at least 12–16 characters.
- Mix uppercase, lowercase, numbers, and symbols.
- Avoid dictionary words, names, dates.
- Use passphrases (random words + numbers + symbols).
- Enable Multi-Factor Authentication (MFA).
- Consider password managers for unique passwords.