Analysis of 32m passwords.

Stuff that don´t fit in the other categories.
Post Reply
User avatar
Big-E
Administrator
Administrator
Posts: 1332
Joined: 16 May 2007, 16:00
16
Location: IN UR ____ , ____ING UR _____ .
Contact:

Analysis of 32m passwords.

Post by Big-E »

Nice little insight into how users choose their passwords based on real data.

http://www.net-security.org/secworld.php?id=8742

User avatar
lilrofl
Siliconoclast
Siliconoclast
Posts: 1363
Joined: 28 Jan 2009, 17:00
15
Location: California, USA
Contact:

Post by lilrofl »

123456... that's a good one....

Good find!
knuffeltjes voor mijn knuffel
[img]http://i911.photobucket.com/albums/ac320/stuphsack/Sig.jpg[/img]

User avatar
bad_brain
Site Owner
Site Owner
Posts: 11636
Joined: 06 Apr 2005, 16:00
19
Location: In your eye floaters.
Contact:

Post by bad_brain »

oh yeah...user passwords, the nightmare of every site/server admin...when I create accounts for customers I always generate the passwords for them and hope they will not find the function to set new ones... :lol:

here's a really good password generator btw:
http://sourceforge.net/projects/epg/
:)
Image

User avatar
l0ngb1t
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 598
Joined: 15 Apr 2009, 16:00
15
Contact:

Post by l0ngb1t »

5. iloveyou
this one is very true...
i can tell that from my friend password...
as well as one of the most common password type over here are the boy/girl friend phone number or name and even nick name...
a little chat with the victim can make predicting the password an easy task...
and of course the mighty iloveyouXXX .
:wink:
There is an UNEQUAL amount of good and bad in most things, the trick is to work out the ratio and act accordingly. "The Jester"

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

The big danger is people using the same password for all their logins, including work. This means you can crack a weaker application like a chat program, and then use that password against the victim's more secure accounts.

The chart should be helpful in building your dictionary cracking DB

Image

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
bad_brain
Site Owner
Site Owner
Posts: 11636
Joined: 06 Apr 2005, 16:00
19
Location: In your eye floaters.
Contact:

Post by bad_brain »

oh, they forgot to mention another classic:
username == password

:lol:
Image

User avatar
lilrofl
Siliconoclast
Siliconoclast
Posts: 1363
Joined: 28 Jan 2009, 17:00
15
Location: California, USA
Contact:

Post by lilrofl »

ah, the old john accounts... hard to believe people still do that.
knuffeltjes voor mijn knuffel
[img]http://i911.photobucket.com/albums/ac320/stuphsack/Sig.jpg[/img]

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

P4 - no you are exactly right - I had mention it before - you can profile someone for their password. Somehow, it is a reasonable deduction made from observing that person's common sense, education level, internet/computer savvy, and even some 'interviewing and interogation' conversation with the victim. You get a sense of if they follow rules, if they care/aware of dangers, and then you use a reasonable assumption that people use passwords they can remember - by chosing something in their life, or even in front of them.

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
f4Gg0t_43
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 245
Joined: 13 Sep 2008, 16:00
15
Contact:

Post by f4Gg0t_43 »

If all else fails, some websites have secret questions, they are usually extremely easy to guess.

Post Reply