94
top 28 comments
sorted by: hot top controversial new old
[-] henfredemars@infosec.pub 23 points 1 week ago

Woof. This is why it’s critically important to use a password manager. We simply have too many accounts to remember unique passwords, and repeatedly we see some of those accounts will get breached and your details stolen.

[-] stringere@sh.itjust.works 16 points 1 week ago* (last edited 1 week ago)

This is why it’s critically important to use a password manager.

Except for people who used 1Password, DashLane, LastPass, Enpass, Keeper, and Keepass2Android.

[-] xenspidey@lemmy.zip 13 points 1 week ago

Yep, bitwarden for the win

Self-hosted for the double win.

[-] derGottesknecht@feddit.org 3 points 1 week ago

When and how has keepass2aandroid been compromised?

[-] stringere@sh.itjust.works 1 points 5 days ago

Autospill affects Android password programs including keepass2android. Not a flaw in Keepass (which I use) but in Android.

[-] justdoitlater@lemmy.world 1 points 1 week ago
[-] aStonedSanta@lemm.ee 2 points 1 week ago

They’ve been hacked. So therefore you’ve been extremely fucking hacked.

[-] 01189998819991197253@infosec.pub 21 points 1 week ago* (last edited 1 week ago)

Anyone have a link to the actual list? [Or, more specifically, has haveibeenpwned incorporated it? I can't find anything on their site stating so.]

[-] habitualcynic@lemmy.ml 3 points 1 week ago

The article says their tool “will” include the new ones, so I plan to check it and haveibeenpwned in a couple days.

Thanks, mate! I'm sure I can find the list on the dn somewhere, but I don't actually want/need the list itself.

[-] habitualcynic@lemmy.ml 2 points 1 week ago

Same and I’m not sure I want my browser history to have that I went looking for it lol

That's a fair point hahaha

[-] Fredy1422@lemmy.ml 2 points 1 week ago

https://haveibeenpwned.com/ is another option that has the largest data base of passwords, phone numbers and e-mail

But did they incorporate this 2024 list, yet?

[-] habitualcynic@lemmy.ml 2 points 1 week ago

Appreciate it, cheers!

[-] thefrankring@lemmy.world 4 points 1 week ago

password123 is still my password of choice.

[-] Alphane_Moon@lemmy.world 3 points 1 week ago

Nah, I'd say the passwords from Hackers (1995) such as love, sex, secret, god are the best.

[-] breakingcups@lemmy.world 4 points 1 week ago

So, only passwords, right? Not associated with usernames?

[-] hoshikarakitaridia@lemmy.world 11 points 1 week ago* (last edited 1 week ago)

I would assume that because the original rockyou list was always just used for dictionary brute force attacks, so no associated usernames.

[-] Voroxpete@sh.itjust.works 11 points 1 week ago

Correct. This is a brute force dictionary. It's a very powerful tool, but it's applications are severely limited. Any well designed system has protection from brute force attacks. It's mostly useful for stuff like cracking encrypted databases, which would be a situation where the target is entirely under your control. You can't just break into someone's Gmail with it.

[-] gnutard@sh.itjust.works 2 points 1 week ago* (last edited 1 week ago)

How would you even crack an encrypted database? I guess the hacker somehow stole it from the server and has it in their dump of other databases they're trying to crack? I don't do hacking, I'm just curious with how it works.

[-] hoshikarakitaridia@lemmy.world 9 points 1 week ago* (last edited 1 week ago)

That has to do with how hashes work.

Hash is if you want someone to be able to check if he's got the right password but not able to know what it actually says.

Imagine my password is "shark". Let's say I use a hash algorithm so that it becomes "2gtth5". If I log in. I enter my password. My browser* uses the same algorithm, so the text I entered is "2gtth5" now. The server looks up my hashed password, checks if it's the same and then it lets me log in. The benefit is, the server doesn't know my actual password, it only knows that the hash is "2gtth5". This means if the database gets compromised, people only see "2gtth5" but not my actual password. And because it's a hash, they don't know how to get back from "2gtth5" to "shark" and therefore my password is not compromised.

Now imagine if I knew the hashing algorithm used and I have a list of possible passwords. There might be "shark" in there. So I can take the password list, make a hash out of every password and see if it matches. Because my password is in there, the hash for "shark" will match the hash "2gtth5" in the compromised database and they now know my actual password. This is a far bigger problem.

Everytime you see that someone "hacked" a database and password hashes got compromised, this is what happens. They use rock you and a few other lists to see if they can "crack" the hashes (this just means checking the hashes and seeing if one of the password from the list matches).

This is specifically what those lists are for. They are used by bad actors to make use of the hashed passwords they stole.

Glossary:

  • hash: representation of some text
  • cracking a hash: trying to get the actual text from a hash
  • salted hash: a hash with fake characters in there
  • algorithm: basically the way your program works, either the code or a scientific representation of the way it works

*Someone in the comments corrected me on this. The server does the hashing not the browser.

The browser could do the hashing, but then the frontend would need the same salt, which is a huge liability. Some apps obfuscate it by encrypting with a nonce or something, but all that does is delay an attack.

Standard practice is indeed on the server with a limited number of attempts on the same account in a time window to prevent brute force attacks.

[-] decisivelyhoodnoises@sh.itjust.works 9 points 1 week ago* (last edited 1 week ago)

My browser uses the same algorithm, so the text I entered is "2gtth5" now. The server looks up my hashed password

This is not correct. Your browser will submit "shark" and then the backend server will do whatever hashing is required and after that it will compare the hashes. If hashing was happening in the browser that would mean that an attacker would be be able to attack by using just the hashes of the passwords, not the passwords themselves. Also in such case, the browser would had been responsible to do the required salting which in turn would make it pointless as it would had been known.

[-] hoshikarakitaridia@lemmy.world 5 points 1 week ago* (last edited 1 week ago)

Ah that makes sense let me put an asterisk on that then

[-] Voroxpete@sh.itjust.works 1 points 1 week ago

By guessing the correct password, which is where this brute force dictionary comes in. A database, or other encrypted file, has no means of preventing repeat guesses, so you can take as many bites at the apple as you want. With high end GPU clusters you can attempt thousands of guesses per second. If you restrict your guesses to likely answers only (which is the point of the password list) you can break through in a pretty reasonable amount of time, assuming a vaguely common password was used. Of course, if the database or file is encrypted with something like a random and sufficiently long alphanumeric password or similar, that's a whole different story, and your odds of getting in go down significantly.

There are other attacks of course, but those get significantly more complicated and rely on there being some sort of flaw in the encryption scheme to exploit, or you managing to find the password by some other means (sniff it out of memory while the system is live, social engineering, etc).

[-] Zomg@lemmy.world 1 points 1 week ago* (last edited 1 week ago)

The databases aren't encrypted exactly...

The DB don't even store passwords, but a hash of a user's password. When someone logs in, their password is hashed and compared to what's stored in the DB. If they match, entry is granted.

Passwords stored as one-way hashes are cracked by generating passwords and running them against the same hash algorithm, like sha256, sha-1 or md5 if you're especially shitty at protecting information. Same hash = same password in most cases. The cracking is done using GPUs because they accelerate at those types of functions. This doesn't even consider salted hashes which make the process more difficult for an attacker.

You do this locally so that you don't lock a username out or trip alerts or become noticed by someone until you're ready to gain access.

this post was submitted on 05 Jul 2024
94 points (99.0% liked)

Cybersecurity

5012 readers
178 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS