Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Tuesday September 05 2017, @09:39PM   Printer-friendly
from the have-you-checked-your-passwords-lately? dept.

Submitted via IRC for TheMightyBuzzard

CynoSure Prime, a "password research collective", has reversed the hashes of nearly 320 million hashed passwords provided by security researcher Troy Hunt through the Pwned Passwords searchable online database.

Their effort, pulled off with the help of two other researchers, revealed many things:

  • Interesting statistics regarding these real world passwords exposed in data breaches,
  • The fact that this database also contains some 2.5 million email addresses and 230,000 email/password combinations (Hunt intends to purge that data from the database), and
  • Some bugs in the Hashcat password recovery tool.

"The longest password we found was 400 characters, while the shortest was only 3 characters long. About 0.06% of passwords were 50 characters or longer with 96.67% of passwords being 16 characters or less," the collective shared.

"Roughly 87.3% of passwords fall into the character set of LowerNum 47.5%, LowerCase 24.75%, Num 8.15%, and MixedNum 6.89% respectively. In addition we saw UTF-8 encoded passwords along with passes containing control characters."

Source: https://www.helpnetsecurity.com/2017/09/05/researchers-reverse-320-million-hashed-passwords/


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Interesting) by stormwyrm on Wednesday September 06 2017, @08:17AM (4 children)

    by stormwyrm (717) on Wednesday September 06 2017, @08:17AM (#564080) Journal
    How did they reverse a password with 400 characters? Even if it's all lowercase alphanumerics, that's something like 10565 possible passwords if the characters are completely random. Brute forcing such a password would need energy of the order of 10542 joules, far, far more than the total mass-energy of the visible universe (4×1069 joules) to brute force even if you could compute at the Landauer limit. I take it that it isn't a completely random password and they had some clues to crack it. Or did they merely find a hash collision which happened to be 400 characters long (meaning that the actual password probably isn't that long)?
    --
    Numquam ponenda est pluralitas sine necessitate.
    Starting Score:    1  point
    Moderation   +2  
       Insightful=1, Interesting=1, Total=2
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   4  
  • (Score: 0) by Anonymous Coward on Wednesday September 06 2017, @12:24PM (1 child)

    by Anonymous Coward on Wednesday September 06 2017, @12:24PM (#564121)

    Because was a match for some compound dictionary words or known text?

    That is why 25 chars passwords with minimal entropy like CorrectHorseBatteryStaple [xkcd.com] are as quick to break as 1234.

    • (Score: 3, Insightful) by stormwyrm on Wednesday September 06 2017, @02:55PM

      by stormwyrm (717) on Wednesday September 06 2017, @02:55PM (#564153) Journal

      A 400-character password though is something else. Even if it is an XKCD 936-style password, given that the average English word is five characters, that would mean it'd be made up of something like 80 words, and assuming you get words from the canonical 2048-word dictionary of common words, that still means you'd have to go through 204880 possible passwords, approximately 10264 possible passwords. Don't be too quick to scoff at XKCD 936. Simply increasing the number of words to 12 gets you 1039 possible passwords, roughly equivalent to a 132-bit cryptographic key. This is enough entropy that an intelligence agency would rather consider other methods of breaking the password than by brute force. At the same time I'd think it's not that hard to remember a dozen random words. The human mind is good at making up stories based on them. Just 25 random words gets you to 1082 possible passwords, more passwords than there are sub-atomic particles in the visible universe, and I don't think it's that much harder for a typical person to remember.

      First possibility though, sounds more likely. It's probably a match to some known text. The entire text in the Library of Congress is somewhere in the 10 TB range (1013 characters). To choose a password at random this way you need to pick a starting position (1013 possibilities) and a length (400 possibilities) so there are only about 1015 possible passwords of this type, 52 bits of entropy. It's not much better than a 4-word XKCD 936 password (44 bits).

      --
      Numquam ponenda est pluralitas sine necessitate.
  • (Score: 0) by Anonymous Coward on Wednesday September 06 2017, @12:29PM

    by Anonymous Coward on Wednesday September 06 2017, @12:29PM (#564125)

    Nope, bruteforcing such a completely random 400 characters password only will cost about $5 [xkcd.com]

  • (Score: 2) by FatPhil on Wednesday September 06 2017, @07:31PM

    by FatPhil (863) <reversethis-{if.fdsa} {ta} {tnelyos-cp}> on Wednesday September 06 2017, @07:31PM (#564235) Homepage
    I bet it's a sentence or stanza from one of the documents on project gutenberg. It wouldn't take long to hash all such inputs, and add them to a dictionary of known hashes. (It's been done, I know someone who's done the equivalent.)

    There's no reason not to add (hashes of) every single tweet ever made too - again, the equivalent of that task has already been done.
    --
    Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves