Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAJ9ii1EAiHWoOcNhyPXfYz6CY+QkCH0vT2yBE6wawvMx4EMXuA@mail.gmail.com>
Date: Thu, 20 Aug 2015 11:27:36 -0400
From: Matt Weir <cweir@...edu>
To: "john-users@...ts.openwall.com" <john-users@...ts.openwall.com>
Subject: Re: Anyone looked at the Ashley Madison data yet?

What's more interesting to me are the 1324 corporate NT hashes that were
contained in the dump. From a very quick cracking session it looks like
they were created with a password creation policy in place that required
all passwords to be at least seven characters long and contain at least one
uppercase character and one digit. From a research perspective this is very
useful since I don't know of any other publicly available corporate
password set like this.

Matt

On Thu, Aug 20, 2015 at 7:15 AM, François <francois.pesce@...il.com> wrote:

> Hello guys, @JokFP here.
>
> I've got ~300 passwords cracked after 12 hours using single mode cracking.
> It's not great, but I'm really not spending much CPU money on it.
>
> It's not really fast, and passwords found are *really* weak:
> it looks like there was no password requirement at all. Some of them are 5
> letters or very common pass from pass lists like "shadow", others are equal
> to the nickname used.
>
> Based on this preliminary results, I'm afraid that launching a top-500
> passwords attack with no or simple rules (like append 1, append 0-9 etc.)
> might be probably effective (maybe in the order of hundred of thousand to
> million accounts compromised).
>
> Examples of password found by single mode here: 01050105 101196 111223344
> 14789a 42ashley 4444bud 774tsews 8519namor 96onepalajj 987654321reppiz
> aa12358 aaaaaa ABCDEFG alexas Anderson2020 anglesmith1 arzu1299 asd1234
> asdasd Attili69 ax987 barrios bbuckup beast BENJE22 bin2001 bitefor burrell
> capriforlife Carloseduardo12587 chocolatudos CLONE69 colby123 coppy400
> curry daniel DAVID888 DDS0011 dengo87 dennis6792 diogo dkgkd dogbait
> eddieet ENALIAM evair Gabi1919 GATITO gemmer ghj9635 gj4237 gjb0009 goalin
> hg5758 HIANZ hotbabe hothot hulkman johnfix jorgegonzalez2015 k612309
> kanenas krish12 ksj4860 kupal Laurent lebron limaj logan lolilol loyiso
> maddmaxx Marcelo MARK111 masexi mati142 Matyone mikgarcia mimiacy mono071
> monte morenosc nicolay777 nidaerep okim3650 pecas pikachu piropiro pyrek89
> qhdrnTl qwe44444 ram3131 raulromero richarddelk rober roberto roquette
> rrxxpp S7762639 sergvs sexpots shaan stephanie StlefStlef tazman69 Testing
> thalish tjh18 udomsin VE2015N vic7781 vox51 wlswogh www2095 xuxiding xxcvb
> ydw2da yesyouashley z50180 zakizak znlived Zuluboi
>
> Francois Pesce
>
> On Thu, Aug 20, 2015 at 1:10 AM, Rich Rumble <richrumble@...il.com> wrote:
>
> > On Wed, Aug 19, 2015 at 6:33 PM, Solar Designer <solar@...nwall.com>
> > wrote:
> > > On Wed, Aug 19, 2015 at 05:25:22PM -0500, Jerry Kemp wrote:
> > >> Wondering if anyone has looked at the Ashley Madison data dump yet?
> > >>
> > >> According to this article:
> > >>
> > >> <
> >
> http://arstechnica.com/security/2015/08/data-from-hack-of-ashley-madison-cheater-site-purportedly-dumped-online/
> > >
> > >>
> > >> The dump contains 10 Gb of data and passwds are in the bcrypt format.
> > >
> > > I haven't looked at the dump, but I tweeted a summary of other tweets:
> > >
> > > <solardiz> Ashley Madison is 36.1M bcrypt cost 12 salts so 1
> > CPU-week/password, says @jmgosney; dozens already cracked with "john
> > -single", says @JokFP
> > >
> > > In other words: strong hashes, but many weak passwords.  The weak
> > > passwords are slowly, but crackable.  The stronger passwords are only
> > > potentially crackable in a targeted attack (on a specific user), but
> > > won't likely be cracked in typical mass password dump cracking fun that
> > > we've seen for other mass password hash leaks.  This one is different.
> > > It's probably the largest bcrypt hash leak so far.
> > >
> > Small sample appeared in twitter:
> > https://twitter.com/sambowne/status/633754116804620288
> >
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.