Omega Owners Forum

Please login or register.

Login with username, password and session length
Advanced search  

News:

Welcome to OOF

Pages: 1 [2] 3  All   Go Down

Author Topic: haveibeenpwmed.com  (Read 5109 times)

0 Members and 1 Guest are viewing this topic.

zirk

  • Omega Queen
  • *****
  • Offline Offline
  • Gender: Male
  • Epping Forest
  • Posts: 11431
  • 3.2 Manual Special Saloon ReMapped and LPG'd and
    • 3.2 Manual Special Estate
    • View Profile
Re: haveibeenpwmed.com
« Reply #15 on: 31 August 2017, 10:39:11 »

For info I have 2 entries on there, mainly from harvested details from a couple of websites that should have done better to protect themselves.  Follow the basics above and you'll be fine  :y

Incidentally - I figure it's likely only you who'll be interested in this ;) A colleague of mine has the source files from the recent leak (the ~711m records) and has cracked 100% of the hashed passwords contained therein..

..it took 32 NVidia GeForce 1080TIs under 12hrs to do. :o

I don't know if I'm more impressed that he found the source files, or that he has 32 (expensive!) graphics cards to dedicate to hash cracking..
A friend of mine is the IT Manager of a Private High School or what ever their called these days, anyway come Summer Holidays plus the other breaks, He has a large Network of Computers (and as you say Graphic Card Power) at he's disposal.  :-X
Logged

aaronjb

  • Guest
Re: haveibeenpwmed.com
« Reply #16 on: 31 August 2017, 10:43:39 »

Kevin -  ;D ;D He has a six month old kid so I am assuming it was "Must escape from baby" time in his household ;)

Actually I was off on my statistics - it took six hours, 32x 1080TIs and another ~50 other, smaller GPUs..

Under "Breaches you were pwned in"  it says "Online Spambot"

I can't see how a spam bot would have got the password though - I don't follow email links unless I absolutely trust them, and even then, I go to the homepage of the site by typing it in on the address bar.

Allen, then further down the page you should see:

Quote
Onliner Spambot (spam list): In August 2017, a spambot by the name of Onliner Spambot was identified by security researcher Benkow moʞuƎq. The malicious software contained a server-based component located on an IP address in the Netherlands which exposed a large number of files containing personal information. In total, there were 711 million unique email addresses, many of which were also accompanied by corresponding passwords. A full write-up on what data was found is in the blog post titled Inside the Massive 711 Million Record Onliner Spambot Dump.

Compromised data: Email addresses, Passwords

A spam Bot didn't get your password, a spam bot was using your password (potentially).  This would be the breach I just noted as needing only 6 hours for a single individual to crack the password hashes - organised criminals would have even more power at their disposal.

Basically .. change your password(s). Everywhere, because Troy (who runs HIBP) isn't going to tell you which password has been compromised. Theoretically I could find out via Justin (the aforementioned individual with time on his hands) but I can't really pimp him out as a service ;)

FWIW, he worked out that ~95% of his Facebook friends all have their details (including password, including mine!) in that dump, so you're not alone.
Logged

Gaffers

  • Omega Queen
  • *****
  • Offline Offline
  • Gender: Male
  • NE Hampshire/Surrey
  • Posts: 11322
    • Ford Ranger Wildtrak
    • View Profile
Re: haveibeenpwmed.com
« Reply #17 on: 31 August 2017, 10:54:54 »

I would hazard caution against using online password managers, they are often targeted for obvious reasons and they are not infallible.  Only use offline ones that you can control access to (and by that I do not mean an excel spreadsheet, just look at Sont Pictures to figure out why that is a very bad idea)

I have recently got a Mooltipass to play with and I am quite impressed.  The wife is terrible at remembering the passwords for her important, yet frequently used, accounts and so needs this device.  I have trouble remembering all the various passwords for the Raspberry Pi devices I run so rather than using the same for them all or writing them down I have a separate card for me which I use for that.  It can also be used for a digital will in the event of death or incapacitation so that NoK can access the important stuff.
Logged

Allenm

  • Senior Member
  • ****
  • Offline Offline
  • Gender: Male
  • Milton Keynes
  • Posts: 642
    • View Profile
Re: haveibeenpwmed.com
« Reply #18 on: 31 August 2017, 11:05:30 »

Kevin -  ;D ;D He has a six month old kid so I am assuming it was "Must escape from baby" time in his household ;)

Actually I was off on my statistics - it took six hours, 32x 1080TIs and another ~50 other, smaller GPUs..

Under "Breaches you were pwned in"  it says "Online Spambot"

I can't see how a spam bot would have got the password though - I don't follow email links unless I absolutely trust them, and even then, I go to the homepage of the site by typing it in on the address bar.

Allen, then further down the page you should see:

Quote
Onliner Spambot (spam list): In August 2017, a spambot by the name of Onliner Spambot was identified by security researcher Benkow moʞuƎq. The malicious software contained a server-based component located on an IP address in the Netherlands which exposed a large number of files containing personal information. In total, there were 711 million unique email addresses, many of which were also accompanied by corresponding passwords. A full write-up on what data was found is in the blog post titled Inside the Massive 711 Million Record Onliner Spambot Dump.

Compromised data: Email addresses, Passwords

A spam Bot didn't get your password, a spam bot was using your password (potentially).  This would be the breach I just noted as needing only 6 hours for a single individual to crack the password hashes - organised criminals would have even more power at their disposal.

Basically .. change your password(s). Everywhere, because Troy (who runs HIBP) isn't going to tell you which password has been compromised. Theoretically I could find out via Justin (the aforementioned individual with time on his hands) but I can't really pimp him out as a service ;)

FWIW, he worked out that ~95% of his Facebook friends all have their details (including password, including mine!) in that dump, so you're not alone.

Thanks Aaron, I will have to change all my passwords then!  what a ball ache. I don't use the same password across multiple sites, so have shit loads as a result.
Logged

Doctor Gollum

  • Get A Life!!
  • *****
  • Offline Offline
  • Gender: Male
  • In a colds and darks puddleses
  • Posts: 28172
  • If you can't eat them, join them...
    • Feetses.
    • View Profile
Re: haveibeenpwmed.com
« Reply #19 on: 31 August 2017, 13:12:27 »

LinkedIn seems to be the source. I no longer have a LinkedIn account, haven't done for a while now, should I worry, or is it the current email address etc that has been exposed :-\
Logged
Onanists always think outside the box.

biggriffin

  • Omega Lord
  • *****
  • Offline Offline
  • huntingdon, Hoof'land
  • Posts: 9756
    • Vectra in a posh frock.
    • View Profile
Re: haveibeenpwmed.com
« Reply #20 on: 31 August 2017, 13:28:43 »

Kevin -  ;D ;D He has a six month old kid so I am assuming it was "Must escape from baby" time in his household ;)

Actually I was off on my statistics - it took six hours, 32x 1080TIs and another ~50 other, smaller GPUs..

Under "Breaches you were pwned in"  it says "Online Spambot"

I can't see how a spam bot would have got the password though - I don't follow email links unless I absolutely trust them, and even then, I go to the homepage of the site by typing it in on the address bar.

Allen, then further down the page you should see:

Quote
Onliner Spambot (spam list): In August 2017, a spambot by the name of Onliner Spambot was identified by security researcher Benkow moʞuƎq. The malicious software contained a server-based component located on an IP address in the Netherlands which exposed a large number of files containing personal information. In total, there were 711 million unique email addresses, many of which were also accompanied by corresponding passwords. A full write-up on what data was found is in the blog post titled Inside the Massive 711 Million Record Onliner Spambot Dump.

Compromised data: Email addresses, Passwords

       
.

The above statement is what I got on one email address, could it be linked to one company the above statement  (virgin).
Logged
Hoof'land storeman.

frostbite

  • Senior Member
  • ****
  • Offline Offline
  • Gender: Male
  • Roanapur City aka Skem
  • Posts: 631
    • 00' e46 325i se
    • View Profile
Re: haveibeenpwmed.com
« Reply #21 on: 31 August 2017, 13:47:22 »

I have 2 but I have never been on those sites
Last fm and River city spam list

both of which had issues back in  2012 according to the checker
Logged
e46 325i se - 1.8vvti avensis liftback

omega2018

  • Omega Knight
  • *****
  • Offline Offline
  • Posts: 1080
    • 2.6 manual elite
    • View Profile
Re: haveibeenpwmed.com
« Reply #22 on: 01 September 2017, 00:54:04 »

its easy to have just one basic password but never use the same password for every site. then for every site you will know each individual password but only have to remember one password.   just needs a bit of thinking about 8)

similar method with pin numbers, you can write a different number (which isn't the pin) on all your cards, then by adding the number you do remember (and isn't written down) to each, you generate the pin unique to that card. :y
« Last Edit: 01 September 2017, 00:57:53 by migmog »
Logged

aaronjb

  • Guest
Re: haveibeenpwmed.com
« Reply #23 on: 01 September 2017, 08:48:41 »

I'm just going to leave this here:



(Trouble is, most sites restrict the number of characters you can enter..)
Logged

Gaffers

  • Omega Queen
  • *****
  • Offline Offline
  • Gender: Male
  • NE Hampshire/Surrey
  • Posts: 11322
    • Ford Ranger Wildtrak
    • View Profile
Re: haveibeenpwmed.com
« Reply #24 on: 01 September 2017, 09:10:34 »

ahem...dictionary attacks....ahem... ::)
Logged

aaronjb

  • Guest
Re: haveibeenpwmed.com
« Reply #25 on: 01 September 2017, 09:13:44 »

ahem...dictionary attacks....ahem... ::)

Still made much more complex by passphrases rather than passwords.

What are the odds of a dictionary having "myauntoncedyedherhairpink" in it?
Logged

Gaffers

  • Omega Queen
  • *****
  • Offline Offline
  • Gender: Male
  • NE Hampshire/Surrey
  • Posts: 11322
    • Ford Ranger Wildtrak
    • View Profile
Re: haveibeenpwmed.com
« Reply #26 on: 01 September 2017, 12:19:56 »

Depending on the phrase the entropy for a passphrase can be very weak  and reduce it even further by adding a bit of Natual Language Programming in order to workout possible word combinations like you describe.  You may have to have quite a long phrase in order to achieve the same entropy for a good complex 20 character password remembering that some websites restrict the size of a password to 20 chars or less due to the constraints on their hashing and salting algorithms.  This is where password managers come in and as long as they are offline and you keep a backup they tick nearly every single box.  They arent perfect but then nothing is, in this world it is all about making it hard to hack/break in/defraud you rather than your neighbour.
Logged

STEMO

  • Guest
Re: haveibeenpwmed.com
« Reply #27 on: 01 September 2017, 12:32:44 »

I would imagine the thing you would like to protect more than anything else would be your banking. I use the iOS apps rather than websites and, I think, they're pretty secure.
Logged

Gaffers

  • Omega Queen
  • *****
  • Offline Offline
  • Gender: Male
  • NE Hampshire/Surrey
  • Posts: 11322
    • Ford Ranger Wildtrak
    • View Profile
Re: haveibeenpwmed.com
« Reply #28 on: 01 September 2017, 12:38:23 »

Depends on the App as some are built well whereas others are absolute dog toffee.  Plus sometimes the teams they hire to pentest the app are not very good but as long as they get their tick in the box to say it has passed testing.....
Logged

tigers_gonads

  • Omega Lord
  • *****
  • Offline Offline
  • Gender: Male
  • Kinston Upon Hull
  • Posts: 8592
  • Driving a Honda CR-V which doesn't smell of pee
    • Honda CR-V
    • View Profile
Re: haveibeenpwmed.com
« Reply #29 on: 01 September 2017, 12:41:29 »

Checked mine, all okay  :y

As for passwords, all based on the same thing BUT slightly different  ;)
House Wi-Fi one is 34 characters long and uses more then just numbers and letters  ;)
Logged
Pages: 1 [2] 3  All   Go Up
 

Page created in 0.033 seconds with 18 queries.