• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Collapse

You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:

  • You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
  • You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
  • If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.

Previously on "Security is paramount"

Collapse

  • NickFitz
    replied
    Originally posted by Sysman View Post
    Even that has been addressed



    It gets worse when the guy starts using GPU processing. Worth a read.
    Good article

    Leave a comment:


  • Sysman
    replied
    Originally posted by NickFitz View Post
    One thing they don't mention there is that already-cracked hashes in the dumps have the first five characters set to zero, so you have to check for that too.
    Even that has been addressed

    One issue becomes apparent: about half the file has had the first 5 characters zeroed out. This is discussed at ycombinator. Atom has released a version of his Hashcat password cracker to deal with this. John-the-Ripper apparently also has published a patch for this.

    ...

    So let's try the other file containing the corrupted hashes using the updated Hashcat feature on the other file, containing all the zeroed-out hashes.

    As you can see, this straight dictionary lookup results in 688-thousand passwords being cracked, or about one fifth of all the zeroed hashes.
    It gets worse when the guy starts using GPU processing. Worth a read.

    Leave a comment:


  • NickFitz
    replied
    One thing they don't mention there is that already-cracked hashes in the dumps have the first five characters set to zero, so you have to check for that too.

    Leave a comment:


  • Sysman
    replied
    Originally posted by Doggy Styles View Post
    They can just look it up.
    They need some rather large rainbow tables to do that.

    On the other hand one of the reports I read last week cited a >30 GB (compressed size) set of tables out there somewhere.

    I have a feeling that checksums will give collisions so that my-extravagantly-long-password will give the same checksum as something-shorter.

    Details of the LinkedIn Hash Brute-Force

    LinkedIn was using the SHA-1 digest for passwords, so the folks looking to reverse the passwords are using the following brute-force to match the posted hash:

    echo -n "password" | openssl dgst -sha1

    If you want to determine if your password was in one of the dumps, that's how. Match the SHA-1 hash that was generated from that sequence against one in the dump, and your password was in that dump.

    ...

    And SHA-1 is intended to be fast to calculate; it's not a good general choice for hashing passwords.

    And the GPU-based attacks are gonzo fast, based on the timestamps on some of the follow-up postings related to the original password dumps.

    Leave a comment:


  • mudskipper
    replied
    Originally posted by doodab View Post
    I only really use it for finding people with comedy names. I see MF really has taken a job in the states:

    randy gaylord profiles | LinkedIn
    Hairy arsed bloke isn't there any more

    Anyone heard from him? Is he OK? His fanclub miss him!

    Leave a comment:


  • doodab
    replied
    I only really use it for finding people with comedy names. I see MF really has taken a job in the states:

    randy gaylord profiles | LinkedIn

    Leave a comment:


  • Doggy Styles
    replied
    Originally posted by OwlHoot View Post
    My linkedin password is about 30 characters long now, with numbers, symbols, upper & lowercase etc.

    I'd like to see hackers figure out that one with a dictionary search
    They can just look it up.

    Leave a comment:


  • OwlHoot
    replied
    My linkedin password is about 30 characters long now, with numbers, symbols, upper & lowercase etc.

    I'd like to see hackers figure out that one with a dictionary search

    Leave a comment:


  • MarillionFan
    replied
    Originally posted by Diver View Post
    You can't now

    I knew your email address so I simply hijacked your account
    Does doodab use halfwit@hotmail.com then?

    Leave a comment:


  • doodab
    replied
    Originally posted by k2p2 View Post
    wtf? really? I already reset my password.
    Don't worry, they'll broadcast the new one for you shortly.

    Leave a comment:


  • Diver
    replied
    Originally posted by doodab View Post


    I think I will sign in and delete my account you ******* half witted protomonkeys.
    You can't now

    I knew your email address so I simply hijacked your account

    Leave a comment:


  • mudskipper
    replied
    Originally posted by doodab View Post


    I think I will sign in and delete my account you ******* half witted protomonkeys.
    wtf? really? I already reset my password.

    Leave a comment:


  • doodab
    started a topic Security is paramount

    Security is paramount

    The security of your account is very important to us at LinkedIn. As a precaution, we disabled your password, and advise you to take the following steps to reset it. If you reset your password in the last two days, there is no need for further action.

    1. Type www.linkedin.com/settings directly into your browser
    2. Type in your email address and press Sign In, no password necessary
    3. Follow the on-screen directions to reset your password


    I think I will sign in and delete my account you ******* half witted protomonkeys.
Working...
X