Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security News

Passwords From PHPBB Attack Analyzed 299

Robert David Graham writes "The hacker who broke into phpbb.com posted the passwords online. I was sent the password list, so I ran it through my analysis tools and posted the results. Nothing terribly surprising here; 123456 and password are the most popular passwords as you would expect. I tried to be a bit more creative in my analysis, though, to get into the psychology of why people choose the passwords they do. '14% of passwords were patterns on the keyboard, like "1234" or "qwerty" or "asdf." There are a lot of different patterns people choose, like "1qaz2wsx" or "1q2w3e." I spent a while googling "159357" trying to figure out how to categorize it, then realized it was a pattern on the numeric keypad. I suppose whereas "1234" is popular among right-hand people, "159357" will be popular among lefties.'"
This discussion has been archived. No new comments can be posted.

Passwords From PHPBB Attack Analyzed

Comments Filter:
  • by Anonymous Coward on Saturday February 07, 2009 @01:30PM (#26764885)

    As in : left hand on the mouse, right hand free to type something ?

  • by chillax137 ( 612431 ) on Saturday February 07, 2009 @01:32PM (#26764893) Homepage
    The idea is that lefties are mousing with their left hands - they have the right hand free to do the typing.
  • by Penguin Follower ( 576525 ) <scrose1978@gma[ ]com ['il.' in gap]> on Saturday February 07, 2009 @01:56PM (#26765095) Journal
    I work for the IT staff of a hospital. Fingerprint readers cause us a headeache because the hardware does not work reliably. We recently started shopping for new vendors for finger print readers (trying to find one that works more reliably). Both of the new vendors came in to show us their hardware and couldn't get them to work with at least 90% reliability. We're looking at other forms of authentication now. Problem being, we have to have two forms of identification due to the state board of pharmacy. It was going to be fingerprint readers and passwords... now looks like maybe RSA tokens and passwords instead. We use RSA already and that system doesn't give us many problem at all.
  • by freedomlinux ( 1072142 ) on Saturday February 07, 2009 @02:06PM (#26765169) Homepage
    Another leftie here...
    I never use the mouse on the left and switching the button layout seems like an awkward hassle.

    Maybe I'm not used to it because I tend to use public computers where admins would disapprove of re-arranging.
    I'm just so used to the regular right-handed mouse and don't know any lefties for aren't.
  • by filesiteguy ( 695431 ) <perfectreign@gmail.com> on Saturday February 07, 2009 @03:18PM (#26765847)
    It is a horrible problem. PHPbb, however, does not store in plaintext. Under versions 1x and 2x, they were stored as MD5. Realizing this was still insecure, they changed to a stronger hash algorithm. However, the software that was hacked - the mailing list- still stored many of the passwords under the 2.x formula. Those who had logged in under 3.x had their passwords changed and are not susceptible.
  • by sakdoctor ( 1087155 ) on Saturday February 07, 2009 @04:23PM (#26766397) Homepage

    If you're going to rant about encryption then get modded +5, try to be factually correct so you don't mislead people.

    CRC32 is a checksum algorithm.
    Integrity algorithm - This doesn't mean anything!
    MD5 and SHA1 are both hash algorithms.
    MD5 is weak because it's not not collision resistant.
    SHA256 and up are recommended.

    For passwords simply appending the salt is sufficient. Hashes are not reversible. They can't be "undone mathematically".

    There is a related issue called an extension attack, where data can be added without knowing the original hash value. For that you need an HMAC which is the correct way to incorporate ("mix and blend") a secret key with data.

    Avoid adding rounds to weak hashes. Pick a larger hash. A 512bit hash has 1.3 Ã-- 10^154 possible outputs!

    Do not reinvent the hash.
    Do not reinvent the HMAC.
    Learn the proper application of both.

  • by Cthefuture ( 665326 ) on Saturday February 07, 2009 @05:05PM (#26766723)

    Exactly.

    OpenID [openid.net] is suppose to help with that. It seems to be slowly gaining support but is still not nearly pervasive enough. It has the advantage of supporting much stronger multi-factor based authentication if you want it (smartcards, etc) and its decentralized nature means you're not putting all your eggs in one basket like most other single sign on solutions.

  • by mosschops ( 413617 ) on Saturday February 07, 2009 @05:11PM (#26766773)

    IE has problems if you add a port number to the address, so google.com:80 doesn't work, but is fine after you add the protocol. That's the only situation I remember that fails.

  • by Anonymous Coward on Saturday February 07, 2009 @05:15PM (#26766799)

    Did you even read the parent? The passwords were hashed with MD5. No cleartext you nitwit.

    MD5 is weak and the attacker(s) got the passwords by reversing the MD5 hash. Or at least obtained passwords with the same hash (ie. collisions in the MD5 space).

  • by Anonymous Coward on Saturday February 07, 2009 @05:39PM (#26766921)

    in the case of phpbb, they got the unsalted MD5 hashes out of a MySQL DB after gaining access to the server through a PHPList exploit. It sounds like he ran some rainbow tables and brute forcing to determine the passwords. He got something like 26K out of 200-400K reversed.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...