Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

13. ... r-q1


interests / soc.culture.china / Re: We cracked more than 18,000 passwords. Here are our tips.

SubjectAuthor
* We cracked more than 18,000 passwords. Here are our tips.ltlee1
`- Re: We cracked more than 18,000 passwords. Here are our tips.Ǝ

1
We cracked more than 18,000 passwords. Here are our tips.

<6984cd33-b05a-4750-891b-12fdd48059e3n@googlegroups.com>

  copy mid

https://www.novabbs.com/interests/article-flat.php?id=13019&group=soc.culture.china#13019

  copy link   Newsgroups: soc.culture.china
X-Received: by 2002:ae9:de04:0:b0:76c:e08d:dfb2 with SMTP id s4-20020ae9de04000000b0076ce08ddfb2mr8540qkf.9.1691194571448;
Fri, 04 Aug 2023 17:16:11 -0700 (PDT)
X-Received: by 2002:a05:6870:4285:b0:1bb:f2f:2a66 with SMTP id
y5-20020a056870428500b001bb0f2f2a66mr3359954oah.10.1691194571121; Fri, 04 Aug
2023 17:16:11 -0700 (PDT)
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: soc.culture.china
Date: Fri, 4 Aug 2023 17:16:10 -0700 (PDT)
Injection-Info: google-groups.googlegroups.com; posting-host=107.15.133.242; posting-account=sQgtagoAAAB2Cf4qBTW8cwfp7bDiKK3s
NNTP-Posting-Host: 107.15.133.242
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <6984cd33-b05a-4750-891b-12fdd48059e3n@googlegroups.com>
Subject: We cracked more than 18,000 passwords. Here are our tips.
From: ltl...@hotmail.com (ltlee1)
Injection-Date: Sat, 05 Aug 2023 00:16:11 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 4167
 by: ltlee1 - Sat, 5 Aug 2023 00:16 UTC

https://www.washingtonpost.com/opinions/2023/08/02/interior-department-passwords-ineffective-cybersecurity/

"A recent inspection undertaken in my office at the Interior Department illustrates the risks. Our team tested whether the department’s password controls were effective at preventing a malicious actor from gaining unauthorized access to its systems. To accomplish this, we used a common technique known worldwide, spending less than $15,000 on a system designed to crack passwords using free, publicly available software and a custom word list.

And guess what. We successfully cracked more than 18,000 — or 21 percent — of the department’s passwords, nearly 14,000 in the first 90 minutes of testing alone. The hacked passwords included those for hundreds of accounts belonging to senior department officials and hundreds belonging to employees with elevated privileges, such as system administrators. Some of our findings were surprising, given that we were testing government systems containing potentially high-value information. For instance, “Password-1234” was the most commonly used password. In fact, five of the top 10 passwords included some variation of the word “password,” along with “1234.”

Even so, 99.99 percent of the hacked accounts met the department’s password complexity requirements, which included the string of letters, numbers and special characters that every computer user is so familiar with. In other words, 99.99 percent of the passwords our team hacked were considered strong enough to thwart a hacker.
....
We made two recommendations to the department, but they apply equally to anyone using a computer at a nongovernment job or at home. First, we recommended that the department adopt multifactor authentication across all IT systems. MFA is the gold standard for cybersecurity. It refers to the use of at least two factors to access computer systems. The factors usually fall into three categories: something you have (a digital token), something you know (a password) and something you are (a fingerprint or retinal scan). MFA requires at least two of those factors, such as a fingerprint plus a password.
....
Second, where MFA cannot be currently implemented, we recommended that the department move away from passwords and toward passphrases.
....
To make matters worse, passwords are not only hard to remember but also have the added benefit of being ineffective: Even complex passwords are remarkably easy for computers to guess. A computer can hack a password such as “5pr1ng*ish3re” relatively quickly. The better choice is a more easily remembered passphrase that strings together several unrelated words totaling more than 16 letters, such as “DinosaurLetterTrailChance.” Though a computer can break a complex password in days, if not hours, it could take the same computer centuries or even millennia to crack a passphrase."

Re: We cracked more than 18,000 passwords. Here are our tips.

<7bfa0082-9299-4bf8-9cc8-94c22b330adcn@googlegroups.com>

  copy mid

https://www.novabbs.com/interests/article-flat.php?id=13031&group=soc.culture.china#13031

  copy link   Newsgroups: soc.culture.china
X-Received: by 2002:a05:6214:954:b0:63c:e916:a2cf with SMTP id dn20-20020a056214095400b0063ce916a2cfmr15490qvb.6.1691272400641; Sat, 05 Aug 2023 14:53:20 -0700 (PDT)
X-Received: by 2002:a05:6870:713:b0:1bb:a267:2187 with SMTP id ea19-20020a056870071300b001bba2672187mr6070992oab.11.1691272400232; Sat, 05 Aug 2023 14:53:20 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!feeder.usenetexpress.com!tr2.iad1.usenetexpress.com!69.80.99.14.MISMATCH!border-1.nntp.ord.giganews.com!nntp.giganews.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: soc.culture.china
Date: Sat, 5 Aug 2023 14:53:20 -0700 (PDT)
In-Reply-To: <6984cd33-b05a-4750-891b-12fdd48059e3n@googlegroups.com>
Injection-Info: google-groups.googlegroups.com; posting-host=85.253.104.59; posting-account=nxK7jAoAAADIYAPyx1k6l6aKc_FmZRVi
NNTP-Posting-Host: 85.253.104.59
References: <6984cd33-b05a-4750-891b-12fdd48059e3n@googlegroups.com>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <7bfa0082-9299-4bf8-9cc8-94c22b330adcn@googlegroups.com>
Subject: Re: We cracked more than 18,000 passwords. Here are our tips.
From: yyyyyyyy...@mail.ee (Ǝ)
Injection-Date: Sat, 05 Aug 2023 21:53:20 +0000
Content-Type: text/plain; charset="UTF-8"
Lines: 8
 by: Ǝ - Sat, 5 Aug 2023 21:53 UTC

Hello

Come to

jutudkoigilteemadel.mygamesonline.org

!!!!!!!!!!!!!!!!!!!!!!!!!!!!

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor