"These are business people, so a lot of them are doing it like they would in the business world," he explained. "They didn't have to use uppercase but they are. A lot of the patterns we're seeing are the more complicated ones. I cracked a 15-character one that was just the top row of the keyboard."
I'm assuming a password like this is unlikely to be cracked even in an unsalted hash list?"My (LinkedIn) password was in it and mine was 20 plus characters and was random," Redman told Ars.
Panther Modern":39qux7r2 said:If any of you are stupid enough to use a formulaic password like "EDCrfvTGByhnUJM" or "!qaz@WSX3edc" you deserve to have your fucking password cracked.
Panther Modern":1m8l0gtp said:"These are business people, so a lot of them are doing it like they would in the business world," he explained. "They didn't have to use uppercase but they are. A lot of the patterns we're seeing are the more complicated ones. I cracked a 15-character one that was just the top row of the keyboard."
If any of you are stupid enough to use a formulaic password like "EDCrfvTGByhnUJM" or "!qaz@WSX3edc" you deserve to have your fucking password cracked.
When I was working as a civilian contractor in Iraq and Afghanistan, I was appalled at watching no less than four "admins" I worked with used the exact same "pattern password" to secure their admin-level accounts on classified government networks.
Don't use pattern passwords, or passwords that someone could easily guess. You're only setting yourself and others up for failure if you do.
Miscellaneous bug fixes
Improvements in calendar
Panther Modern":274hs9tj said:"These are business people, so a lot of them are doing it like they would in the business world," he explained. "They didn't have to use uppercase but they are. A lot of the patterns we're seeing are the more complicated ones. I cracked a 15-character one that was just the top row of the keyboard."
If any of you are stupid enough to use a formulaic password like "EDCrfvTGByhnUJM" or "!qaz@WSX3edc" you deserve to have your fucking password cracked.
When I was working as a civilian contractor in Iraq and Afghanistan, I was appalled at watching no less than four "admins" I worked with used the exact same "pattern password" to secure their admin-level accounts on government networks.
Don't use pattern passwords, or passwords that someone could easily guess. You're only setting yourself and others up for failure if you do.
They only have the hashes of the passwords. They still have to crack them (with modified dictionary attacks, or brute force) to get your plaintext password.brionl":2sm95y87 said:You are getting entirely the wrong lesson from this. "Weak" passwords only matter if somebody is bruteforcing/dictionary attack on random logins. This is not the case here. They managed to crack two sites and obtain and decrypt their entire password lists. So nobody is bruteforcing anything. They ALREADY HAVE YOUR PASSWORD. It doesn't matter how random it is.Panther Modern":2sm95y87 said:If any of you are stupid enough to use a formulaic password like "EDCrfvTGByhnUJM" or "!qaz@WSX3edc" you deserve to have your fucking password cracked.
The important point is to not reuse passwords and/or usernames from one site to another.
H2O Rip":2licizyp said:While the article is interesting, it is missing the most crucial point for readers:
is this:
1) Something the average user should be concerned about (i.e. can these be used to access said accounts?)
2) Is there a way to check to see if one's information is on there?
3) What should the average user be doing to react personally to maintain information security.
.
With no salt, rainbow tables are going find the weaker ones in no time.sep332":j2stfna0 said:They only have the hashes of the passwords. They still have to crack them (with modified dictionary attacks, or brute force) to get your plaintext password.brionl":j2stfna0 said:You are getting entirely the wrong lesson from this. "Weak" passwords only matter if somebody is bruteforcing/dictionary attack on random logins. This is not the case here. They managed to crack two sites and obtain and decrypt their entire password lists. So nobody is bruteforcing anything. They ALREADY HAVE YOUR PASSWORD. It doesn't matter how random it is.Panther Modern":j2stfna0 said:If any of you are stupid enough to use a formulaic password like "EDCrfvTGByhnUJM" or "!qaz@WSX3edc" you deserve to have your fucking password cracked.
The important point is to not reuse passwords and/or usernames from one site to another.
thisisnotsecure
sidran32":ktl60iid said:Is there a link to the list so I can check if mine is on it?
Oh yeah, forgot about rainbow tables! The thing about rainbow tables is that they're random. They don't crack "weaker" ones first.hobgoblin":ktl60iid said:With no salt, rainbow tables are going find the weaker ones in no time.sep332":ktl60iid said:They only have the hashes of the passwords. They still have to crack them (with modified dictionary attacks, or brute force) to get your plaintext password.
sep332":2ou1f0my said:They only have the hashes of the passwords. They still have to crack them (with modified dictionary attacks, or brute force) to get your plaintext password.brionl":2ou1f0my said:The important point is to not reuse passwords and/or usernames from one site to another.
brionl":14ewj1ex said:H2O Rip":14ewj1ex said:While the article is interesting, it is missing the most crucial point for readers:
is this:
1) Something the average user should be concerned about (i.e. can these be used to access said accounts?)
2) Is there a way to check to see if one's information is on there?
3) What should the average user be doing to react personally to maintain information security.
.
If you are on LinkedIn or eHarmony and used the same username/password on any other sites, then you should be concerned. Change your password to something different than any other site.
The passwords were stored by the website (LinkedIn and/or eHarmony) as unsalted SHA-1 which are trivial to crack. Rainbow tables will reveal the shorter ones, a couple GPUs will take care of the rest.The bigger of the two lists contains almost 6.46 million passwords that have been converted into hashes using the SHA-1 cryptographic function.
1. Most likely the hacker has the usernames(its in the article)H2O Rip":31iqbqtq said:While the article is interesting, it is missing the most crucial point for readers:
1) Something the average user should be concerned about (i.e. can these be used to access said accounts?)
2) Is there a way to check to see if one's information is on there?
3) What should the average user be doing to react personally to maintain information security.
.
OmniWrench":3utr406v said:These are systems which need to be used by human beings
The fact that they are not easily useable by human beings is the fault of the systems and designers, not of the people using them.
People don't work like this.
They never have, and they never will.
Continuing to blame people for not working like computers is silly.
We need a completely new approach to this.
Endless hard to guess passwords isn't it.
We need to think about how human beings actually work, what we're good at and what we're not, and design around that.
brionl":2bi3m7ip said:Panther Modern":2bi3m7ip said:If any of you are stupid enough to use a formulaic password like "EDCrfvTGByhnUJM" or "!qaz@WSX3edc" you deserve to have your fucking password cracked.
You are getting entirely the wrong lesson from this. "Weak" passwords only matter if somebody is bruteforcing/dictionary attack on random logins. This is not the case here. They managed to crack two sites and obtain and decrypt their entire password lists. So nobody is bruteforcing anything. They ALREADY HAVE YOUR PASSWORD. It doesn't matter how random it is.
The important point is to not reuse passwords and/or usernames from one site to another.
Yes, a basket you control (open source if you use KeePass, that can be locked to a password and a cryptographic key) that won't be compromised when some incompetent developer stores passwords in an insecure way (no salt? :facepalmAnd yes, I'm aware of password "vault" programs, all that does is move all your eggs to one single basket.
brionl":khiy7ama said:Panther Modern":khiy7ama said:If any of you are stupid enough to use a formulaic password like "EDCrfvTGByhnUJM" or "!qaz@WSX3edc" you deserve to have your fucking password cracked.
You are getting entirely the wrong lesson from this. "Weak" passwords only matter if somebody is bruteforcing/dictionary attack on random logins. This is not the case here. They managed to crack two sites and obtain and decrypt their entire password lists. So nobody is bruteforcing anything. They ALREADY HAVE YOUR PASSWORD. It doesn't matter how random it is.
The important point is to not reuse passwords and/or usernames from one site to another.
brionl":3lh64vfz said:Panther Modern":3lh64vfz said:If any of you are stupid enough to use a formulaic password like "EDCrfvTGByhnUJM" or "!qaz@WSX3edc" you deserve to have your fucking password cracked.
You are getting entirely the wrong lesson from this. "Weak" passwords only matter if somebody is bruteforcing/dictionary attack on random logins. This is not the case here. They managed to crack two sites and obtain and decrypt their entire password lists. So nobody is bruteforcing anything. They ALREADY HAVE YOUR PASSWORD. It doesn't matter how random it is.
The important point is to not reuse passwords and/or usernames from one site to another.
wait, so a hacker news comment tells you to type your password into this to tell you whether or not your password is in the list?semiquaver":1cwox79f said:From the hacker news comments, a script that can tell you whether your password is in the dump and whether or not it was already cracked (the cracked passwords are marked in the file with leading zeros)
http://news.ycombinator.com/item?id=4074416
My fairly complicated password was in the list and had already been cracked :S
Right, these are the SHA-1 hashes that are supposedly from LinkedIn. If your password has been cracked already it is marked with 000000. Example: 'linkedin':spotter":1k06b7jf said:sep332: that does not have usernames just things that sort of appear to be hashes.
Panther Modern":e8q9zv1p said:brionl":e8q9zv1p said:Panther Modern":e8q9zv1p said:If any of you are stupid enough to use a formulaic password like "EDCrfvTGByhnUJM" or "!qaz@WSX3edc" you deserve to have your fucking password cracked.
You are getting entirely the wrong lesson from this. "Weak" passwords only matter if somebody is bruteforcing/dictionary attack on random logins. This is not the case here. They managed to crack two sites and obtain and decrypt their entire password lists. So nobody is bruteforcing anything. They ALREADY HAVE YOUR PASSWORD. It doesn't matter how random it is.
The important point is to not reuse passwords and/or usernames from one site to another.
No, they do not. They have unsalted hashes, which must then be cracked (a salted hash is more difficult).
To help crack the unsalted hashes, they'll try using common patterns and strings (like l33tsp34k in the company name, say, "3h4rm0ny" or "eharm0ny" to help the process along.
If you choose a password that has a guessable pattern like those above, you are only fucking yourself in the ass when it comes to events like this.
Z1ggy":330ay99h said:wait, so a hacker news comment tells you to type your password into this to tell you whether or not your password is in the list?semiquaver":330ay99h said:From the hacker news comments, a script that can tell you whether your password is in the dump and whether or not it was already cracked (the cracked passwords are marked in the file with leading zeros)
http://news.ycombinator.com/item?id=4074416
My fairly complicated password was in the list and had already been cracked :S
so your giving them a list of passwords that might not be cracked?
Z1ggy":2iukbbl3 said:wait, so a hacker news comment tells you to type your password into this to tell you whether or not your password is in the list?semiquaver":2iukbbl3 said:From the hacker news comments, a script that can tell you whether your password is in the dump and whether or not it was already cracked (the cracked passwords are marked in the file with leading zeros)
http://news.ycombinator.com/item?id=4074416
My fairly complicated password was in the list and had already been cracked :S
so your giving them a list of passwords that might not be cracked?
No.. Follow the link. It provides the source to a simple python script that you can run locally (if you have the hash list). It just runs sha1() on your input and searches the list.Z1ggy":w9h7upeh said:wait, so a hacker news comment tells you to type your password into this to tell you whether or not your password is in the list?semiquaver":w9h7upeh said:From the hacker news comments, a script that can tell you whether your password is in the dump and whether or not it was already cracked (the cracked passwords are marked in the file with leading zeros)
http://news.ycombinator.com/item?id=4074416
My fairly complicated password was in the list and had already been cracked :S
so your giving them a list of passwords that might not be cracked?
beebee":1nq4fogt said:It doesn't matter how clever of a password you dream up if the "host" isn't secure. Your only security is to not use the same password for multiple accounts.
I'd also like to point out to the tea bagger crowd that the vast majority of these security breaches occur in the private sector.
OmniWrench":20m5auwz said:I counted, I have over 50 separate places where I have username/password combos.
And yes, I'm aware of password "vault" programs, all that does is move all your eggs to one single basket.
We need a completely new approach to this. Endless hard to guess passwords isn't it. We need to think about how human beings actually work, what we're good at and what we're not, and design around that.