<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>i3m Blog &#187; passwords</title>
	<atom:link href="http://internal3m.com/CMS/Wordpress/tag/passwords/feed/" rel="self" type="application/rss+xml" />
	<link>http://internal3m.com/CMS/Wordpress</link>
	<description></description>
	<lastBuildDate>Thu, 21 Apr 2016 14:54:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.1.41</generator>
	<item>
		<title>Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”</title>
		<link>http://internal3m.com/CMS/Wordpress/2013/05/28/anatomy-of-a-hack-how-crackers-ransack-passwords-like-qeadzcwrsfxv1331/</link>
		<comments>http://internal3m.com/CMS/Wordpress/2013/05/28/anatomy-of-a-hack-how-crackers-ransack-passwords-like-qeadzcwrsfxv1331/#comments</comments>
		<pubDate>Tue, 28 May 2013 12:37:16 +0000</pubDate>
		<dc:creator><![CDATA[..internal..]]></dc:creator>
				<category><![CDATA[Internet News]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[crack]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[md5]]></category>
		<category><![CDATA[passwords]]></category>

		<guid isPermaLink="false">http://internal3m.com/CMS/Wordpress/?p=1987</guid>
		<description><![CDATA[  In March, readers followed along as Nate Anderson, Ars deputy editor and a self-admitted newbie to password cracking, downloaded a list of more than 16,000 cryptographically hashed passcodes. Within a few hours, he deciphered almost half of them. The moral of the story: if a reporter with zero training in the ancient art of <a href='http://internal3m.com/CMS/Wordpress/2013/05/28/anatomy-of-a-hack-how-crackers-ransack-passwords-like-qeadzcwrsfxv1331/' class='excerpt-more'>[...]</a>]]></description>
				<content:encoded><![CDATA[<p style="text-align: center;"> <a href="http://internal3m.com/CMS/Wordpress/wp-content/uploads/2013/02/random-numbers.gif"><img class="aligncenter  wp-image-1713" alt="random-numbers" src="http://internal3m.com/CMS/Wordpress/wp-content/uploads/2013/02/random-numbers-300x225.gif" width="210" height="158" /></a></p>
<p>In March, readers followed along as Nate Anderson, Ars deputy editor and a self-admitted newbie to password cracking, downloaded a list of more than 16,000 cryptographically hashed passcodes. Within a few hours, he deciphered almost half of them. The moral of the story: if a reporter with zero training in the ancient art of password cracking can achieve such results, imagine what more seasoned attackers can do.</p>
<p>Imagine no more. We asked three cracking experts to attack the same list Anderson targeted and recount the results in all their color and technical detail Iron Chef style. The results, to say the least, were eye opening because they show how quickly even long passwords with letters, numbers, and symbols can be discovered.</p>
<p>The list contained 16,449 passwords converted into hashes using the MD5 cryptographic hash function. Security-conscious websites never store passwords in plaintext. Instead, they work only with these so-called one-way hashes, which are incapable of being mathematically converted back into the letters, numbers, and symbols originally chosen by the user. In the event of a security breach that exposes the password data, an attacker still must painstakingly guess the plaintext for each hash—for instance, they must guess that &#8220;5f4dcc3b5aa765d61d8327deb882cf99&#8243; and &#8220;7c6a180b36896a0a8c02787eeafb0e4c&#8221; are the MD5 hashes for &#8220;password&#8221; and &#8220;password1&#8243; respectively. (For more details on password hashing, see the earlier Ars feature &#8220;Why passwords have never been weaker—and crackers have never been stronger.&#8221;)</p>
<p>While Andersons 47-percent success rate is impressive, its miniscule when compared to what real crackers can do, as Anderson himself made clear. To prove the point, we gave them the same list and watched over their shoulders as they tore it to shreds.</p>
<p><strong>MORE:  </strong><a href="http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/" target="_Blank">Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331” | Ars Technica</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://internal3m.com/CMS/Wordpress/2013/05/28/anatomy-of-a-hack-how-crackers-ransack-passwords-like-qeadzcwrsfxv1331/feed/</wfw:commentRss>
		<slash:comments>438</slash:comments>
		</item>
		<item>
		<title>Password hints easily extracted from Windows 7, 8</title>
		<link>http://internal3m.com/CMS/Wordpress/2012/08/23/password-hints-easily-extracted-from-windows-7-8/</link>
		<comments>http://internal3m.com/CMS/Wordpress/2012/08/23/password-hints-easily-extracted-from-windows-7-8/#comments</comments>
		<pubDate>Thu, 23 Aug 2012 12:25:19 +0000</pubDate>
		<dc:creator><![CDATA[..internal..]]></dc:creator>
				<category><![CDATA[Tech News]]></category>
		<category><![CDATA[7]]></category>
		<category><![CDATA[8]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[user accounts]]></category>
		<category><![CDATA[windows]]></category>

		<guid isPermaLink="false">http://internal3m.com/CMS/Wordpress/?p=1294</guid>
		<description><![CDATA[Our recent feature on the growing vulnerability of passwords chronicled the myriad ways crackers extract clues used to guess other people&#8217;s login credentials. Add to that list a password reminder feature built in to recent versions of Microsoft&#8217;s Windows operating system. It turns out the password clues for Windows 7 and 8 are stored in the OS <a href='http://internal3m.com/CMS/Wordpress/2012/08/23/password-hints-easily-extracted-from-windows-7-8/' class='excerpt-more'>[...]</a>]]></description>
				<content:encoded><![CDATA[<p style="margin-top: 0px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: #ffffff;">Our recent feature on the <a style="text-decoration: none; color: #699fb3;" href="http://arstechnica.com/security/2012/08/passwords-under-assault/">growing vulnerability of passwords</a> chronicled the myriad ways crackers extract clues used to guess other people&#8217;s login credentials. Add to that list a password reminder feature built in to recent versions of Microsoft&#8217;s Windows operating system.</p>
<p style="margin-top: 0px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: #ffffff;">It turns out the password clues for Windows 7 and 8 are stored in the OS registry in a scrambled format that can be easily converted into human-readable form. That information would undoubtedly be useful to hackers who intercept a cryptographic hash of a targeted computer, but are unable to crack it. Jonathan Claudius, the SpiderLabs vulnerability researcher who documented the new Windows behavior, has written a script that automates the attack and added it to <a style="text-decoration: none; color: #699fb3;" href="http://www.metasploit.com/">Metasploit</a>, an open-source toolkit popular among whitehat and blackhat hackers alike.</p>
<p style="margin-top: 0px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: #ffffff;">The clue is added to the OS registry when users configure a Windows account to provide a hint about the password needed to access it. When he first saw the long string of letters and numbers that stored the hint, he thought it had been encrypted. Upon further examination, he learned that an eight-line Ruby script quickly decoded the text chunks.</p>
<p><strong>MORE: </strong> <a href="http://arstechnica.com/security/2012/08/windows-8-password-hints/" target="_blank">Password hints easily extracted from Windows 7, 8 | Ars Technica</a>.</p>
<p>&nbsp;</p>
<hr />
]]></content:encoded>
			<wfw:commentRss>http://internal3m.com/CMS/Wordpress/2012/08/23/password-hints-easily-extracted-from-windows-7-8/feed/</wfw:commentRss>
		<slash:comments>53</slash:comments>
		</item>
		<item>
		<title>Why passwords have never been weaker—and crackers have never been stronger</title>
		<link>http://internal3m.com/CMS/Wordpress/2012/08/21/why-passwords-have-never-been-weaker-and-crackers-have-never-been-stronger/</link>
		<comments>http://internal3m.com/CMS/Wordpress/2012/08/21/why-passwords-have-never-been-weaker-and-crackers-have-never-been-stronger/#comments</comments>
		<pubDate>Tue, 21 Aug 2012 12:05:55 +0000</pubDate>
		<dc:creator><![CDATA[..internal..]]></dc:creator>
				<category><![CDATA[Internet News]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[accounts]]></category>
		<category><![CDATA[cracking]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[login]]></category>
		<category><![CDATA[passwords]]></category>

		<guid isPermaLink="false">http://internal3m.com/CMS/Wordpress/?p=1276</guid>
		<description><![CDATA[In late 2010, Sean Brooks received three e-mails over a span of 30 hours warning that his accounts on LinkedIn, Battle.net, and other popular websites were at risk. He was tempted to dismiss them as hoaxes—until he noticed they included specifics that weren&#8217;t typical of mass-produced phishing scams. The e-mails said that his login credentials <a href='http://internal3m.com/CMS/Wordpress/2012/08/21/why-passwords-have-never-been-weaker-and-crackers-have-never-been-stronger/' class='excerpt-more'>[...]</a>]]></description>
				<content:encoded><![CDATA[<p style="margin-top: 0px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: #ffffff;">In late 2010, Sean Brooks received three e-mails over a span of 30 hours warning that his accounts on LinkedIn, Battle.net, and other popular websites were at risk. He was tempted to dismiss them as hoaxes—until he noticed they included specifics that weren&#8217;t typical of mass-produced phishing scams. The e-mails said that his login credentials for various Gawker websites had been exposed by hackers who rooted the sites&#8217; servers, then bragged about it online; if Brooks used the same e-mail and password for other accounts, they would be compromised too.</p>
<p style="margin-top: 0px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: #ffffff;">The warnings Brooks and millions of other people received that December weren&#8217;t fabrications. Within hours of anonymous hackers penetrating Gawker servers and <a style="text-decoration: none; color: #699fb3;" href="http://www.theregister.co.uk/2010/12/13/gawker_hacked/">exposing cryptographically protected passwords for 1.3 million of its users</a>, botnets were cracking the passwords and using them to commandeer Twitter accounts and send spam. Over the next few days, the sites advising or requiring their users to change passwords expanded to include Twitter, Amazon, and Yahoo.</p>
<p style="margin-top: 0px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: #ffffff;">&#8220;The danger of weak password habits is becoming increasingly well-recognized,&#8221; said Brooks, who at the time <a style="text-decoration: none; color: #699fb3;" href="https://www.cdt.org/blogs/sean-brooks/gawker-breach-victims-aided-unexpected-allies">blogged about the warnings</a> as the Program Associate for the Center for Democracy and Technology. The warnings, he told me, &#8220;show [that] these companies understand how a security breach outside their systems can create a vulnerability within their networks.&#8221;</p>
<p style="margin-top: 0px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: #ffffff;">The ancient art of password cracking has advanced further in the past five years than it did in the previous several decades combined. At the same time, the dangerous practice of password reuse has surged. The result: security provided by the average password in 2012 has never been weaker.</p>
<h2 style="list-style: none; margin-top: 0px; margin-bottom: 15px; color: #263034; font-family: NoticiaBold, 'Times New Roman', serif; -webkit-font-smoothing: antialiased; text-rendering: optimizelegibility; line-height: 24px; font-size: 20px; background-color: #ffffff;">A new world</h2>
<p style="margin-top: 0px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: #ffffff;">The average Web user maintains 25 separate accounts but uses just 6.5 passwords to protect them, according to a <a style="text-decoration: none; color: #699fb3;" href="https://research.microsoft.com/pubs/74164/www2007.pdf">landmark study (PDF)</a> from 2007. As the Gawker breach demonstrated, such password reuse, combined with the frequent use of e-mail addresses as user names, means that once hackers have plucked login credentials from one site, they often have the means to compromise dozens of other accounts, too.</p>
<p style="margin-top: 0px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: #ffffff;">Newer hardware and modern techniques have also helped to contribute to the rise in password cracking. Now used increasingly for computing, graphics processors allow password-cracking programs to work thousands of times faster than they did just a decade ago on similarly priced PCs that used traditional CPUs alone. A PC running a single <a style="text-decoration: none; color: #699fb3;" href="http://www.amazon.com/Diamond-Radeon-GDDR5-Graphics-7970PE53G/dp/B006UACSZ4/ref=sr_1_2?ie=UTF8&amp;qid=1337125724&amp;sr=8-2">AMD Radeon HD7970</a> GPU, for instance, can try on average an astounding 8.2 billion password combinations each second, depending on the algorithm used to scramble them. Only a decade ago, such speeds were possible only when using pricey supercomputers.</p>
<p><strong>MORE: </strong> <a href="http://arstechnica.com/security/2012/08/passwords-under-assault/" target="_blank">Why passwords have never been weaker—and crackers have never been stronger | Ars Technica</a>.</p>
<p>&nbsp;<br />
<hr/>
]]></content:encoded>
			<wfw:commentRss>http://internal3m.com/CMS/Wordpress/2012/08/21/why-passwords-have-never-been-weaker-and-crackers-have-never-been-stronger/feed/</wfw:commentRss>
		<slash:comments>281</slash:comments>
		</item>
	</channel>
</rss>
