Busy in the password lab...

Busy in the password lab...

Deep in the heart of my secret laboratory here at Egis I conduct my experiment. A client asked that we test their web site login screens. Which method, I pondered? Brute force? Dictionary attack? While I harvested all of their likely usernames from social media and dark repositories, I decided on a combined approach. 

I want a dictionary attack that uses "words" but incorporates typical complexity requirements on networks. Why use just the word "password" when I can also try Password and P@ssword$1 and P@ssword#1 etc. against each of their usernames?

Searching my haunts, I find some lists - top 100, top 1000, top 10000, even the top million passwords in use. These lists are gathered by dark data librarians from the many millions of cracked passwords from big Internet hacks. Good old Yahoo, LinkedIn, and many other names we recognize. Tens of millions of passwords have been compromised and simple metrics ran to find the top X lists.

As I'm browsing through the top 10K list it's just as I thought. These are alright, but most of them couldn't be used by anyone required to meet common requirements. There it is... bosco... but no Bosco1 or Bosco$2... 

Maybe one of the employees at my client would take to bosco but make it more complex? Or any other common phase from this top 10,000 popular passwords list? 

Within fifteen minutes I've made a very small program and it generates my new attack dictionary. Now I've got the 10,000 original passwords to try plus 75,0000 more and this list is really nice. Kick off my attack program to test my client's web site login screen. Each of their likely usernames will be tested for any of these 85,000 passwords.

If their accounts are set up to lock after a few bad tries this could take a really long time. Might set up a delay between tries for each account of 30 minutes and let it run for a few weeks. If I get a hit on any accounts I'll need to see if there is 2-factor authentication that could stop me. May as well just let it fly fast for now, though.

Here's an article I stumbled across while searching for a pre-built list of common complex passwords. Read at your own risk, bwahahaha!  https://wpengine.com/unmasked/

Kristina Monson

Providing Productivity-Boosting, Month-to-Month Workspaces & Virtual Office Solutions

5 年

Great article! Thank you for sharing.?

Melahni ?? Ake

Founder, Community Builder, Award Winning Author 2024, Strategic Partner to Challenge Your Vision and Impact Your Growth: #everydayleaderschangetheworld #everydayleaders #melahniake #maxwellleadership #jmtdna #mlct

5 年

Great stuff Jerry Johnson! Really makes me think??????♀?????♀?

回复

要查看或添加评论,请登录

Jerry Johnson, CISSP, SSCP, ITIL的更多文章

  • Freeze Your Own Credit!

    Freeze Your Own Credit!

    I had coffee with my friend Greg Wright of Greg Wright & Associates LLC last week, and he mentioned something very…

  • Morgan Stanley $1M Fine for Lack of Policies

    Morgan Stanley $1M Fine for Lack of Policies

    I'm sure that this has happened before, but I can't recall any other articles about incidents right now where an…

    1 条评论
  • Cyber Intelligence activities for the masses?

    Cyber Intelligence activities for the masses?

    This article that I saw on the popsci.com web site made me think about a few things: https://www.

  • Some friends from "Microsoft support" called again

    Some friends from "Microsoft support" called again

    I just had a call from a phone number that is becoming familiar to me now. When the call comes in, the displayed source…

  • Apple vs. the FBI

    Apple vs. the FBI

    Something Apple has gotten right, from my understanding, is that enabling password locks on their devices automatically…

  • DNC Data Breach for Sanders Campaign

    DNC Data Breach for Sanders Campaign

    I've been following some of the news about the DNC Data Breach by the Sanders Campaign of data from the Hillary Clinton…

  • Buyer Beware!

    Buyer Beware!

    This morning I read an article about batches of pre-hacked tablets being sold through Amazon and other suppliers. In…

  • Hackers at the Wheel (SciAm)

    Hackers at the Wheel (SciAm)

    Here's a good article I read in this month's Scientific American magazine about the over-hype around car hacking. It's…

社区洞察

其他会员也浏览了