TrackSomebody.com

october27thgroup.com pentesting, pci, red team

illmob.org

Linkedin Top 50 Leaked Passwords

May 19th, 2016 by admin in cracking, Life, Password Info

Earlier this week passwords that were jacked from LinkedIn from 2012 were offered for sale online. What initially thought to be a theft of 6.5 million passwords has actually turned out to be a breach of 117 million passwords. The cache of stolen accounts were hashed with the recently deprecated SHA-1 algorithm. leakedsource.com was able to get their hands on the dump the passwords weren’t salted and easily cracked. Below are their results.

Rank Password Frequency
1 123456 753,305
2 linkedin 172,523
3 password 144,458
4 123456789 94,314
5 12345678 63,769
6 111111 57,210
7 1234567 49,652
8 sunshine 39,118
9 qwerty 37,538
10 654321 33,854
11 000000 32,490
12 password1 30,981
13 abc123 30,398
14 charlie 28,049
15 linked 25,334
16 maggie 23,892
17 michael 23,075
18 666666 22,888
19 princess 22,122
20 123123 21,826
21 iloveyou 20,251
22 1234567890 19,575
23 Linkedin1 19,441
24 daniel 19,184
25 bailey 18,805
26 welcome 18,504
27 buster 18,395
28 Passw0rd 18,208
29 baseball 17,858
30 shadow 17,781
31 121212 17,134
32 hannah 17,040
33 monkey 16,958
34 thomas 16,789
35 summer 16,652
36 george 16,620
37 harley 16,275
38 222222 16,165
39 jessica 16,088
40 ginger 16,040
41 michelle 16,024
42 abcdef 15,938
43 sophie 15,884
44 jordan 15,839
45 freedom 15,793
46 555555 15,664
47 tigger 15,658
48 joshua 15,628
49 pepper 15,610

Bypass Biometrics with Inkjet Printer

March 8th, 2016 by admin in Android, Mobile

Researchers, Kai Cao and Anil Jain, from the Department of Computer Science and Engineering at Michigan State University have loaded up an inkjet printer with cartridges designed for printing electronic circuits, and used the output to fool smartphone fingerprint sensors on a Samsung Galaxy S6 and a Huawei Honor 7. They just needed a reversed scan of the victim’s fingerprint, and an inkjet printer loaded up with ink and paper from printed electronics specialist AGIC. Read their paper ::HERE::.

Source

Reply All

March 8th, 2016 by admin in Life

reply_all

FBI Be All Like…

February 20th, 2016 by admin in cracking, Life

fbi-iphone

Nihilistic Password Questions

January 29th, 2016 by admin in Life

nihilistic

25 Most Popular Passwords of 2015

January 19th, 2016 by admin in cracking, Life

Every year, SplashData complies a list of the millions of stolen passwords made public throughout the last twelve months, then sorts them in order of popularity. This year the results, based on a total of over 2 million leaked passwords, are not the list of random alpha-numeric characters you might hope for. Rather, they’re a lesson in exactly how not to choose a password.
(more…)

Hashcat Now Open Source

December 4th, 2015 by admin in cracking

hashcat3

hashcat and oclHashcat have gone open source. Creator atom, posted on his forum earlier today, that he decided to finally open the source code to developers under the MIT license. He hopes to expand the tool to support new algorithms, native OSX support, and the ultimate reason to decide to go open source was the implementation of the bitsliced DES GPU kernels. Check out the code at: https://github.com/hashcat/

Linksys EA6100 Wireless Router Authentication Bypass

December 4th, 2015 by admin in Privilege Escalation

linksys
Multiple CGI scripts in the web-based administrative interface of the Linksys EA6100 – EA6300 Wireless Router allow unauthenticated access to the high-level administrative functions of the device. This vulnerability can be leveraged by an unauthenticated attacker to obtain the router’s administrative password and subsequently arbitrarily configure the device.
More info: https://www.korelogic.com/Resources/Advisories/KL-001-2015-006.txt

200,000 Comcast accounts leaked

November 24th, 2015 by admin in News

comcast

Reports have emerged that the e-mail, physical addresses, and passwords of up to 200,000 Comcast customers were listed for sale on a Dark Web site for up to $1,000. Someone else leaked the data for free. The cable giant insisted that it had not been hacked and that the most likely reasons for such data appearing on the site were customers either activating malware or falling victim to other social engineering attacks. Either way change your passwords as good practice.

Comcast password cloud courtesy of Stumbles He also has a nice sorted password list ::here::.

Kon-Boot 2.5 released with Windows 10 support

October 12th, 2015 by admin in Apple, Privilege Escalation, windows


Kon-Boot is an application which bypasses the authentication process of Windows and Mac based operating systems. This Kon-Boot version works with both 64-bit and 32-bit Microsoft Windows up to version 10 and Mac OSX Mavericks. Works from a Cd, floppy, or USB. Also supports UEFI based systems.

It also includes special feature which gives you a command prompt with system level privileges at the login screen. Easy to use and excellent for tech repairs, data recovery and security audits. They offer personal and professional licences and well worth the cost. Buy your copy today!

« Previous ArticleNext Article »