Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×
Security

Submission + - Lessons Learned From Cracking 2M LinkedIn Passwords (net-security.org)

An anonymous reader writes: Qualys researcher Francois Pesce used open source password cracker John the Ripper to try to crack SHA-1 hashes of leaked LinkedIn passwords. He ran the John the Ripper default command on a small default password dictionary of less than 4,000 words. The program then switched to incremental mode based on statistical analysis of known password structures, which generated more probable passwords. The results? After 4 hours, approximately 900,000 passwords had been cracked. Francois then ran numerous iterations, incorporating older dictionaries to uncover less common passwords and ended up cracking a total of 2,000,000 passwords.
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Lessons Learned From Cracking 2M LinkedIn Passwords

Comments Filter:

Those who can, do; those who can't, write. Those who can't write work for the Bell Labs Record.

Working...