Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. RockYou Hack Reveals the Worst 20 Passwords

RockYou Hack Reveals the Worst 20 Passwords

Scheduled Pinned Locked Moved The Lounge
tutorialquestioncsscomsecurity
44 Posts 30 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • F fred_

    I use KeePass's random password generation

    C Offline
    C Offline
    Corporal Agarn
    wrote on last edited by
    #18

    I have the free version but the generated passwords are hard to remember. By the way who am I :confused:

    P 1 Reply Last reply
    0
    • E Ennis Ray Lynch Jr

      Just how important is a very secure password when the site you are using gets hacked and exposes your PW in plain-text?

      Need custom software developed? I do custom programming based primarily on MS tools with an emphasis on C# development and consulting. A man said to the universe: "Sir I exist!" "However," replied the universe, "The fact has not created in me A sense of obligation." --Stephen Crane

      Y Offline
      Y Offline
      Yusuf
      wrote on last edited by
      #19

      Ennis Ray Lynch, Jr. wrote:

      Just how important is a very secure password when the site you are using gets hacked and exposes your PW in plain-text?

      Well said.

      Yusuf May I help you?

      1 Reply Last reply
      0
      • D Dan Neely

        I've read a few more articles about the breach. Plaintext passwords in the DB and a simple SQL injection attack were involved.

        3x12=36 2x12=24 1x12=12 0x12=18

        OriginalGriffO Offline
        OriginalGriffO Offline
        OriginalGriff
        wrote on last edited by
        #20

        Oooo! I love the smell of professionalism in the morning!

        All those who believe in psycho kinesis, raise my hand.

        "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
        "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

        1 Reply Last reply
        0
        • OriginalGriffO OriginalGriff

          Haven't read the article (because it took so long to load that I got bored and went away), but to be honest any site which stores a password in any form other than one-way encrypted or SHA hashed is not one I realy want to visit.

          All those who believe in psycho kinesis, raise my hand.

          C Offline
          C Offline
          Chris Losinger
          wrote on last edited by
          #21

          even if they are hashed, you can find out who uses "123456" by generating the hash for "123456" and finding the matches in your list of hashed pwds.

          image processing toolkits | batch image processing

          OriginalGriffO W A M 4 Replies Last reply
          0
          • C Chris Losinger

            even if they are hashed, you can find out who uses "123456" by generating the hash for "123456" and finding the matches in your list of hashed pwds.

            image processing toolkits | batch image processing

            OriginalGriffO Offline
            OriginalGriffO Offline
            OriginalGriff
            wrote on last edited by
            #22

            Good point!

            All those who believe in psycho kinesis, raise my hand.

            "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
            "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

            H 1 Reply Last reply
            0
            • C Corporal Agarn

              I have the free version but the generated passwords are hard to remember. By the way who am I :confused:

              P Offline
              P Offline
              Pete OHanlon
              wrote on last edited by
              #23

              djj55 wrote:

              By the way who am I

              Tonight on America's Dumbest Criminals, we deal with Identity theft. My name's ...????

              "WPF has many lovers. It's a veritable porn star!" - Josh Smith

              As Braveheart once said, "You can take our freedom but you'll never take our Hobnobs!" - Martin Hughes.

              My blog | My articles | MoXAML PowerToys | Onyx

              1 Reply Last reply
              0
              • OriginalGriffO OriginalGriff

                Good point!

                All those who believe in psycho kinesis, raise my hand.

                H Offline
                H Offline
                Hosey
                wrote on last edited by
                #24

                Unless the hash is salted... (hmm sounds like a meal for stoners.. :/)

                1 Reply Last reply
                0
                • Y Yusuf

                  from the article: By far, the most popular password on the site was "123456," apparently satisfying a minimum character limit on the site's password restrictions, but doing little for security. A full 290,731 users used this password, far more than the runner-up, the slightly less complex "12345, which attracted 79,078 uses. clickty[^] I have learned a simple trick to create mid-to-strong password by simple substitution. Let us take "codeproject" as case example, it goes as follows - first let us capitalize some letters => CodeProject - substitute "o" with "0" => C0deProject - upper case e (E) can be imagined as mirror image of 3 => C0d3Pr0j3ct - let us sprinkle some chars (SHIFT 3 = # on the US layout keyboard) => C0d#Pr0j#ct - Finally P can be imagines as mirror image of 9 => C0d#9r0j#ct So we went from codeproject => C0d#9r0j#ct and I can use Code Project as my password hint. :cool: The cool part is there is no limit to the imagination and the resulting password can be as close as random characters. How do you create your password?

                  Yusuf May I help you?

                  U Offline
                  U Offline
                  User 4399548
                  wrote on last edited by
                  #25

                  Don't forget to include a couple of :-) in you pwd. (or :-( for your online banking).

                  1 Reply Last reply
                  0
                  • D David Crow

                    Yusuf wrote:

                    How do you create your password?

                    Take a poem, song lyric, quote, etc, and use the first letter from each word. You can get 20-30 characters easy. That other stuff is just too hard to remember.

                    "One man's wage rise is another man's price increase." - Harold Wilson

                    "Fireproof doesn't mean the fire will never come. It means when the fire comes that you will be able to withstand it." - Michael Simmons

                    M Offline
                    M Offline
                    Member 4593559
                    wrote on last edited by
                    #26

                    Passwords are just a giant PITA tho. It bugs me that just about any site or organisation I go to that requests I use a password, all have a completely different policy on how the password is composed, some accept all alphanumeric characters, some don't, some specify a number at the start of the string, others at the end, it leads me to having a multitude of passwords, that, more often than not, I have to go through the rigmarole of resetting a password everytime I visit a site, because I cant remember the exact sequence of characters for that specific sites password. Now surely that is defeating the object of having a password in the first place. With that in mind, you can see why some people just use strings like "123456" as at least it is easy to remember. I wish someone would invent another way to protect access to your stuff on line.....

                    1 Reply Last reply
                    0
                    • C Chris Losinger

                      even if they are hashed, you can find out who uses "123456" by generating the hash for "123456" and finding the matches in your list of hashed pwds.

                      image processing toolkits | batch image processing

                      W Offline
                      W Offline
                      wibleywoo
                      wrote on last edited by
                      #27

                      unless the hashes are salted... still possible to find a match but you would need to generate a new hash for each check.

                      1 Reply Last reply
                      0
                      • Y Yusuf

                        from the article: By far, the most popular password on the site was "123456," apparently satisfying a minimum character limit on the site's password restrictions, but doing little for security. A full 290,731 users used this password, far more than the runner-up, the slightly less complex "12345, which attracted 79,078 uses. clickty[^] I have learned a simple trick to create mid-to-strong password by simple substitution. Let us take "codeproject" as case example, it goes as follows - first let us capitalize some letters => CodeProject - substitute "o" with "0" => C0deProject - upper case e (E) can be imagined as mirror image of 3 => C0d3Pr0j3ct - let us sprinkle some chars (SHIFT 3 = # on the US layout keyboard) => C0d#Pr0j#ct - Finally P can be imagines as mirror image of 9 => C0d#9r0j#ct So we went from codeproject => C0d#9r0j#ct and I can use Code Project as my password hint. :cool: The cool part is there is no limit to the imagination and the resulting password can be as close as random characters. How do you create your password?

                        Yusuf May I help you?

                        C Offline
                        C Offline
                        CP028
                        wrote on last edited by
                        #28

                        https://www.grc.com/passwords.htm[^]

                        1 Reply Last reply
                        0
                        • E Ennis Ray Lynch Jr

                          I use A real simple forty-two character password

                          Need custom software developed? I do custom programming based primarily on MS tools with an emphasis on C# development and consulting. A man said to the universe: "Sir I exist!" "However," replied the universe, "The fact has not created in me A sense of obligation." --Stephen Crane

                          B Offline
                          B Offline
                          Brad Stiles
                          wrote on last edited by
                          #29

                          Where do *you* bank. :)

                          Currently reading: "The Prince", by Nicolo Machiavelli

                          1 Reply Last reply
                          0
                          • C Chris Losinger

                            even if they are hashed, you can find out who uses "123456" by generating the hash for "123456" and finding the matches in your list of hashed pwds.

                            image processing toolkits | batch image processing

                            A Offline
                            A Offline
                            Andreas Mertens
                            wrote on last edited by
                            #30

                            > even if they are hashed, you can find out who uses "123456" by generating the hash for "123456" and finding the matches in your list of hashed pwds. What you do is include a "salt" value when you create the hash. This is a known random value, stored with the hash. You apply it with the password when creating the hash to see if it matches, but is really difficult to apply in the reverse direction. So a simple dictionary-style comparison won't work.

                            C 1 Reply Last reply
                            0
                            • C Chris Losinger

                              even if they are hashed, you can find out who uses "123456" by generating the hash for "123456" and finding the matches in your list of hashed pwds.

                              image processing toolkits | batch image processing

                              M Offline
                              M Offline
                              Member 2053006
                              wrote on last edited by
                              #31

                              That is why you use the user name and a private string to salt the hash, so no two users with the same password will have the same hashed password. Because of the private string you can not even generate a hash and inject that into the database.

                              1 Reply Last reply
                              0
                              • A Andreas Mertens

                                > even if they are hashed, you can find out who uses "123456" by generating the hash for "123456" and finding the matches in your list of hashed pwds. What you do is include a "salt" value when you create the hash. This is a known random value, stored with the hash. You apply it with the password when creating the hash to see if it matches, but is really difficult to apply in the reverse direction. So a simple dictionary-style comparison won't work.

                                C Offline
                                C Offline
                                Chris Losinger
                                wrote on last edited by
                                #32

                                AndreasMertens wrote:

                                his is a known random value, stored with the hash.

                                yes, i know what a salt is. but, even if a salt value was used, it's sitting right there in the DB along with the hash. and you already know the target password, so the problem of finding who used that password remains trivial.

                                image processing toolkits | batch image processing

                                A 1 Reply Last reply
                                0
                                • C Chris Losinger

                                  AndreasMertens wrote:

                                  his is a known random value, stored with the hash.

                                  yes, i know what a salt is. but, even if a salt value was used, it's sitting right there in the DB along with the hash. and you already know the target password, so the problem of finding who used that password remains trivial.

                                  image processing toolkits | batch image processing

                                  A Offline
                                  A Offline
                                  Andreas Mertens
                                  wrote on last edited by
                                  #33

                                  Ah, you mean in terms of auditing "weak" passwords, and not in terms of trying to hack into a system...

                                  A D 2 Replies Last reply
                                  0
                                  • A Andreas Mertens

                                    Ah, you mean in terms of auditing "weak" passwords, and not in terms of trying to hack into a system...

                                    A Offline
                                    A Offline
                                    Andreas Mertens
                                    wrote on last edited by
                                    #34

                                    Mind though, the problem becomes more complicated - instead of a simple query (PW A generates hash B, select * from table where Hash = "hash a") you now have to do some level of processing against each user's login data.

                                    1 Reply Last reply
                                    0
                                    • Y Yusuf

                                      from the article: By far, the most popular password on the site was "123456," apparently satisfying a minimum character limit on the site's password restrictions, but doing little for security. A full 290,731 users used this password, far more than the runner-up, the slightly less complex "12345, which attracted 79,078 uses. clickty[^] I have learned a simple trick to create mid-to-strong password by simple substitution. Let us take "codeproject" as case example, it goes as follows - first let us capitalize some letters => CodeProject - substitute "o" with "0" => C0deProject - upper case e (E) can be imagined as mirror image of 3 => C0d3Pr0j3ct - let us sprinkle some chars (SHIFT 3 = # on the US layout keyboard) => C0d#Pr0j#ct - Finally P can be imagines as mirror image of 9 => C0d#9r0j#ct So we went from codeproject => C0d#9r0j#ct and I can use Code Project as my password hint. :cool: The cool part is there is no limit to the imagination and the resulting password can be as close as random characters. How do you create your password?

                                      Yusuf May I help you?

                                      T Offline
                                      T Offline
                                      Trevortni
                                      wrote on last edited by
                                      #35

                                      I've been thinking, for quite some time, on coming up with an algorithm to generate passwords on the spot for any site that would satisfy a few requirements: 1. MUST be simple enough to do in my head (or it will be unusable) 2. Changes predictably from site to site for someone who knows the details of the algorithm (which would be only myself) a. Includes components from the name of the website (ensures different passwords for different sites) b. Includes a random element (my master password, if you will) to ensure that even if someone knew the algorithm, they would still be missing a crucial piece to generate the password 3. Includes some sort of serialization; in the event that I need to change a password, I could generate using the next password off of a set iteration technique 4. Meets standard best password techniques (mixes of upper- and lower-case letters, numbers, and symbols); but is flexible enough to drop one or more of these if the site does not allow them 5. Ditto for password length 6. Can predict the stock market and alter reality, and will cause me to be chased by various governmental agencies and religious societies who want to use the algorithm for various unspecified nefarious or not-so-nefarious purposes.[^] Any suggestions?

                                      1 Reply Last reply
                                      0
                                      • Y Yusuf

                                        from the article: By far, the most popular password on the site was "123456," apparently satisfying a minimum character limit on the site's password restrictions, but doing little for security. A full 290,731 users used this password, far more than the runner-up, the slightly less complex "12345, which attracted 79,078 uses. clickty[^] I have learned a simple trick to create mid-to-strong password by simple substitution. Let us take "codeproject" as case example, it goes as follows - first let us capitalize some letters => CodeProject - substitute "o" with "0" => C0deProject - upper case e (E) can be imagined as mirror image of 3 => C0d3Pr0j3ct - let us sprinkle some chars (SHIFT 3 = # on the US layout keyboard) => C0d#Pr0j#ct - Finally P can be imagines as mirror image of 9 => C0d#9r0j#ct So we went from codeproject => C0d#9r0j#ct and I can use Code Project as my password hint. :cool: The cool part is there is no limit to the imagination and the resulting password can be as close as random characters. How do you create your password?

                                        Yusuf May I help you?

                                        G Offline
                                        G Offline
                                        grgran
                                        wrote on last edited by
                                        #36

                                        200,000 users have now changed there password to C0d#9r0j#ct, with a hint that is a link to this thread. :laugh:

                                        Y 1 Reply Last reply
                                        0
                                        • D Dan Neely

                                          I've read a few more articles about the breach. Plaintext passwords in the DB and a simple SQL injection attack were involved.

                                          3x12=36 2x12=24 1x12=12 0x12=18

                                          B Offline
                                          B Offline
                                          bkrubnzi
                                          wrote on last edited by
                                          #37

                                          I don't get your sig.

                                          D 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups