Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security News

Passwords From PHPBB Attack Analyzed 299

Robert David Graham writes "The hacker who broke into phpbb.com posted the passwords online. I was sent the password list, so I ran it through my analysis tools and posted the results. Nothing terribly surprising here; 123456 and password are the most popular passwords as you would expect. I tried to be a bit more creative in my analysis, though, to get into the psychology of why people choose the passwords they do. '14% of passwords were patterns on the keyboard, like "1234" or "qwerty" or "asdf." There are a lot of different patterns people choose, like "1qaz2wsx" or "1q2w3e." I spent a while googling "159357" trying to figure out how to categorize it, then realized it was a pattern on the numeric keypad. I suppose whereas "1234" is popular among right-hand people, "159357" will be popular among lefties.'"
This discussion has been archived. No new comments can be posted.

Passwords From PHPBB Attack Analyzed

Comments Filter:
  • And so... (Score:2, Interesting)

    by Anonymous Coward on Saturday February 07, 2009 @01:23PM (#26764811)

    someone 'analyzed' another password list for correlations and found nothing of inherit value to security of than 'people are a problem'.

    Chalk yet one up for the Adams team.

  • by SolarStorm ( 991940 ) on Saturday February 07, 2009 @01:31PM (#26764887)
    With so many other methods of user verification why do we still continue with passwords? My work uses so many passwords for each application, and forces you to change them montly, and some of them force you to use different passwords, that you can look at any monitor and find a postit note with complete access to the system. When I mentioned this to the SA's. They said they need all of the passwords for security? Why not use thumbprints or cards for verification like the hospital I used to work at? Never typed a single password. Had to take the gloves off once or twice, but never a password.
  • by RedK ( 112790 ) on Saturday February 07, 2009 @01:59PM (#26765111)
    I'm a leftie, and my mouse is on the right, like.. well.. all the other lefties I know. Actually, I have never seen someone use a mouse of the left, though I'm sure that weirdo exists.
  • by Valdrax ( 32670 ) on Saturday February 07, 2009 @02:01PM (#26765129)

    Never would've thought of that. As a left-handed person, I still use the mouse with my right hand because that's where everyone else puts it. Also, I'd have to remap the left/right buttons to be able to use my index finger for the majority of clicking.

    (Coincidentally, I did use that as my phone password for a while after some Cisco phones at my job barred my traditional "12345" (idiots, luggage) VM password. I've never even really understood a need to secure my VM in the first place, but I digress.)

  • by qw0ntum ( 831414 ) on Saturday February 07, 2009 @02:04PM (#26765153) Journal
    From my perusal of TFA, I think the passwords were actually hashed in the DB, but the guy who cracked the site broke them: http://hackedphpbb.blogspot.com/ [blogspot.com]

    The response from phpBB.com seemed to indicate that the only passwords that were cracked were from those accounts that had been created in an older system, and had not logged in under the newer system. Given the large number of spam accounts on that site, I wonder if the majority of those cracked, not recently logged in accounts were spam accounts, and as such if the passwords are not representative of the userbase at large: http://area51.phpbb.com/phpBB/viewtopic.php?f=3&t=29973 [phpbb.com]
  • by mikael ( 484 ) on Saturday February 07, 2009 @02:04PM (#26765155)

    Perhaps it is a difference between laptops and desktop keyboards. On a commodity laptop there is no numeric keypad, though there is the numlock key on some which allows the UIOJKL keys to be used as numeric keys.

    The quickest way of typing numbers is to use the the top row of keys. In that case, sequences like '1234', 'qwe123', q1w2e3' would be the most convenient. If you have a full sized desktop keyboard, then the availability of the keypad would allow the sequence 159357 to be typed in rapidly.

  • by ethana2 ( 1389887 ) on Saturday February 07, 2009 @02:06PM (#26765171)
    How many key patterns are used by people who type with dvorak or colemak? I've always liked the extra security that comes with using an obscure (albeit superior) keyboard layout ;)
  • by Hurricane78 ( 562437 ) <deleted&slashdot,org> on Saturday February 07, 2009 @02:15PM (#26765265)

    But for that, you first have to *find* the letters "qwerty", and maybe even "http://google.com" (because IE does not automatically add the http) first.

    Good luck, finding them on MY keyboard: http://www.neo-layout.org/ [neo-layout.org]
    Hint 1: The letters printed on my keys have no relation to the actual layout.
    Hint 2: "Ebene" means "level". So: Yes, that thing has 6 levels. (7 actually)

  • by eggy78 ( 1227698 ) on Saturday February 07, 2009 @02:19PM (#26765293)
    This is getting a little off-topic, but I used to work with a guy that had a mouse on the left and right side of his keyboard (connected to the same computer). I don't know if he was left- or right-handed, but it was definitely a little odd. He claimed it dramatically increased his productivity and was a pretty amazing setup. I don't believe him.
  • by chill ( 34294 ) on Saturday February 07, 2009 @02:21PM (#26765305) Journal

    I group passwords two ways.

    1. Sites that have no personal info or I don't really give a damn about. Those share 2 or 3 different passwords depending on their lame (no special characters!) requirements. Pick two words, use 7334 spelling and separate them by a punctuation mark. For example "mad money" becomes "M@d;m0n3y". Good luck guessing stuff like that.

    2. Sites that I care about, like online banking or ones that contain personal information (LinkedIn, for example), have random line noise for passwords and I just write them down. There is a notebook in my desk with all the passwords. The desk is locked and in my home office. That is far more secure than trying to make them easy enough to memorize.

    3. If you use Firefox, make sure you use a Master Password [mozilla.com] if you allow it to remember passwords.

    Someone posted this earlier and it is a useful BASH script.

    dd if=/dev/random bs=200 count=1 | tr -cd 'A-Za-z0-9!@#$%^&*()_+'; echo

    Copy a group of 10-15 out of the middle of that and use it for a password.

  • by vorpal22 ( 114901 ) on Saturday February 07, 2009 @02:30PM (#26765395) Homepage Journal

    I'm right handed, and I trained myself to use my mouse with my left hand. The reason? Because I was starting to develop wrist problems back when I was in IT and had to spend eight hours a day on the computer. Using the mouse with your right hand entails having to move over a much larger area of keyboard to get to it (numerical keypad, arrow keys, etc). With the left hand, you only have to travel a small distance. Also, being mouse-ambidextrous allows you to switch back and forth, thus taking the entire burden off of one hand.

    In the end, I decided to go with a trackball, which is built for the right hand (MS optical one) but which I use with my left hand. Furthermore, it's great because since it's a trackball and on the wrong side of the keyboard, it keeps people away from my computer, which is just fine with me :-).

  • by slackergod ( 37906 ) on Saturday February 07, 2009 @02:33PM (#26765409) Homepage Journal

    I agree... it just plain scares me that so many large systems don't even bother with such trivial precautions as hashing. It's even more trivial than sql injections. Up until it happened, I would have _never_ guessed myspace & phpbb stored plaintext. It seems borderline incompetent.

    I've implemented tons of little one-off account systems, for websites small enough they'll probably never even see a hacker. But before I even implemented the first one, I went through the trouble of finding the best password hash algorithm I could (http://people.redhat.com/drepper/SHA-crypt.txt)

    Sure, I've had customers ask "why can't it just email me my password when I forget?" But you know what? Just a few minutes of quick explanation, and even people with NO math or cs background can understand why it's important.

    So for the love of the gods, people, please take an hour out of your time to put in a hash alg (even md5-crypt is better than nothing)... it's just not that hard.

    ---

    Just to go off on a rant here...
    I've also noticed in some web applications there is the tendency to just pick a hash alg at random. Be warned: not all hash algorithms are created equal.

    "Checksum" algorithms such as CRC32 are woefully insufficient: easy to reverse (for small strings), easy to find collisions. They're basically just one guessable step away from plaintext.

    "Integrity" algorithms such as MD5 & SHA are a little better, since they're very hard to reverse, and difficult to find collisions.
    The problem with using these types of hashes directly is that they will always hash a password to the _same_ string. While that's desirable for their purposes (file integrity, etc), that's not good at all for passwords: you can pre-build a table of known mappings beforehand, and use it to quickly guess many passwords in parallel (aka a rainbow table): Given a table of 10k user passwords hashed like this, and a pre-built table, the odds are very good you'll get a significant number of the passwords in a very short amount of time.

    This is why a proper "Password" hash (eg bcrypt, md5-crypt, sha-crypt) includes a "salt" which is randomly generated each time the password is set (and not just the first time). This prevents the rainbow attacks which are possible on plain integrity hashes. But prepending (or appending) the salt is not enough, because since it's effect can be undone mathematically, at least enough so that it presents no real additional barrier.

    Genuine password hashes, while using an integrity hash their basis, mix & blend the password and the salt in so many variable ways as to make this reversal impossible. And there are so many nuances here that _you should not roll your own_ (unless you're Bruce Schneier). Read bcrypt, sha-crypt or md5-crypt's specs for some details.

    Note: don't use the old unix-crypt, while it is a password hash in the strict sense, it's so old and simple, it's barely stronger than crc32.

    Note: sha-crypt adds additional flexibility via it's "rounds" system, allowing it to easily grow more complicated as computers grow more powerful. This is why I prefer it above all the others.

    End rant: all this is why you should use sha-crypt or md5-crypt, and nothing lesser.

  • by tgzuke ( 737692 ) on Saturday February 07, 2009 @03:38PM (#26766031)
    I disagree. I'm left-handed, and my mouse is on the left side. My work (like most others, I'm guessing) has ambidextrous mice, and I use a Razer mouse at home. I just suffer when I find an ergonomic one in the wild, but that's no different than encountering any right-handed device, like can openers or power tools.
  • by CoolQ ( 31072 ) <quentins&comclub,org> on Saturday February 07, 2009 @03:57PM (#26766197) Homepage

    Much simpler:

    openssl rand -base64 32 | head -c 10

    Where "10" is the number of characters you want.

    --Quentin

  • Comment removed (Score:3, Interesting)

    by account_deleted ( 4530225 ) on Saturday February 07, 2009 @04:54PM (#26766651)
    Comment removed based on user account deletion
  • by innocent_white_lamb ( 151825 ) on Saturday February 07, 2009 @05:30PM (#26766875)

    It may depend on how and when you learned to type numbers. I learned to type in school (typing class) on big Underwood manual typewriters, but never really got good at typing the numbers there. But when I got my Commodore 64 and started typing in programs out of Compute! magazine using their mlx program, which involved typing in pages and pages of nothing but numbers, I quickly learned to type numbers just as well as I can type letters. Always using the top row numbers, of course, because the Commodore 64 has no numeric keypad.

    To this day, I never use the numeric keypad on any keyboard. In fact, when it's not there (like on a laptop) I don't miss it a bit.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...