How Charles Dickens helped crack your LinkedIn password
- 08 June, 2012 16:24
Kevin Young, a computer security expert who studies passwords, is nearly at a loss for words. Literally.
Young and his colleagues are working to decode some 2.6 million scrambled LinkedIn passwords, part of a total of 6.1 million released earlier this week on a Russian password cracking forum. Young studies how people pick passwords and how resistant they are to cracking.
The data that was released were password hashes, or cryptographic representations of passwords churned through an algorithm called SHA-1. For example, if a person's password is "Rover" the SHA-1 hash would be "ac54ed2d6c6c938bb66c63c5d0282e9332eed72c."
Converting those hashes into their original passwords is possible using decoding tools and powerful graphics processors. But the longer and more complicated the password -- using sprinklings of capital letters, numbers and symbols -- the longer and harder it is to crack.
What's interesting about the LinkedIn hashes is the trouble experts are having at converting the hashes to their original password. Of the 6.1 million hashes, some 3.5 million appeared to have already been cracked since those hashes have "00000" at the beginning.
That leaves 2.6 million uncracked hashes, which Young and some colleagues have been working to decode. And they're not having a whole lot of luck. They need, in short, more words.
One of the methods for revealing passwords is comparing the hashes with ones that have already been decoded. They can do that by using lists of hashes and their corresponding passwords which have come from other data breaches, such as those affecting Stratfor Global Intelligence and MilitarySingles.com.
Young said it appears the hackers have already used those lists against the LinkedIn hashes. When he ran a check of the LinkedIn hashes against those decoded from the Stratfor and MilitarySingles.com breaches, he only got about 5,000 matches. The "easy pickings," Young said, are gone.
"These are definitely the tougher passwords of the bunch," said Young, an adjunct professor of information security at Utah Valley University. "They're pretty complex."
In order to crack them, Young and his team need more words and more word combinations for so-called brute-force attempts. They've turned to some of the world's most famous books.
Young wrote a program that draws passphrase strings from books such as A Tale of Two Cities, War and Peace, The Call of the Wild and The Land of Oz. The program takes words from those books and creates phrases and concatenations such as "lionstigersbears" and "ihavebeenchangedforgood." Both generated hits in the LinkedIn hashes.
For the passage "Tip was made to carry wood from the forest" -- from The Land of Oz -- Young's program will try the hash for "Tip," then "Tipwas," then "Tipwasmade" and "Tipwasmadeto" and on. The program could also be configured to add numbers, symbols in further attempts to match a hash.
One of the password programs Young's team is using, John the Ripper, is trying some 700 to 800 million word combinations a second. Other tools Young is using are trying as many as 5 billion combinations per second, an astounding figure. So far, they've only decoded around 50,000 LinkedIn hashes.
Young's next idea is try to use combinations of financial and business-related words. Because LinkedIn has many business users, it may be more likely that those types of phrases would be used.
In another innovation, Young's colleague Joshua Dustin recently wrote a program that mines Twitter for more word combinations. The script connects to Twitter and pulls 500 messages related to a desired term, then delivers all of the words in a list.
Dustin wrote on his blog that he used the method against hashes generated by the MD5 algorithm from the MilitarySingles.com breach. Of the 4,400 unique words pulled from Twitter, 1,978 passwords were revealed using John the Ripper cracking program, he wrote.
"This is a very small example of what can be done to generate more relevant password lists using twitter/websites/social media to supply you with the related words," he wrote.
The difficulty in cracking some of the LinkedIn passwords may be of some relief to users, even though LinkedIn said it doesn't believe that e-mail addresses used to login into accounts with passwords have been released.
"These are tough, tough passwords," Young said.
Send news tips and comments to firstname.lastname@example.org
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- The Flexible Workplace: Unlocking Value in the “Bring Your Own Device” Era
- Print intelligently; Control, Save and Conserve
- Transforming Virtualised Infrastructure: The Key to Enabling Mission-critical Databases and Applications
- How Web Security Improves Productivity and Compliance
- Bring ‘em on!‖ – The Consumerisation of Enterprise Mobility
"How many of the Fortune 500 companies have access to PRISM? https://en.wikipedia.org/wiki/Industrial_espionage ..."Australia suspected to have PRISM data: Ludlam
Australia Post’s mail business to lose $200 million this year
Australia Post’s mail business to lose $200 million this year
Microsoft's ambivalence about Office on the Web gives Apple shot with iWork on iCloud
3 Lessons Learned From a Failed Customer Feedback Test
The Foundation for Cloud Management
For businesses looking to provide real-time business solutions to employees and customers alike, you need to have a comprehensive network management strategy. The network is the foundation of all successful cloud services; it must be robust to meet traffic, efficiency, and performance demands. Download today the four steps to get your network operations cloud-ready.
Accelerate Cloud and Composite Application Delivery
Do you require the need for faster release cycles? Do you have reduced budgets required to run and manage a complex test environment? Do you want to decrease your third party expenses? Find out more on how to enable your teams to create, develop and test against virtual services that simulate real service behaviour with no constraints, available anytime.
Advanced Persistent Threats and Real-Time Threat Management
Businesses face a constantly evolving threat landscape. One of the greatest challenges is presented by advanced persistent threats (APTs), which are sophisticated, multi‐faceted attacks targeting a particular organisation. Mitigating the risk of APTs requires advances beyond traditional layered security to include real‐time threat management. This whitepaper describes the nature of APTs, the risks they pose to businesses, and techniques for blocking, detecting, and containing APTs and other emerging threats. Read now.