Paypal warning.

News and important info, general banter, and suggestions for 5punk

Moderator: Forum Moderators

Fear
Zombie
Zombie
Posts: 2032
Joined: August 6th, 2006, 21:45

Post by Fear »

Were your passwords guessable?

I use Keepass to generate and store all my passwords. I tend to shy away from words or non-random data for important sites such as banks, etc. So far so good....

*touches wood*
TezzRexx
Dr Zoidberg
Dr Zoidberg
Posts: 4072
Joined: February 8th, 2005, 15:54
Location: BURMINGHUM, England
Contact:

Post by TezzRexx »

Dr. kitteny berk wrote:3.

2 of us were pretty much refreshing 5punk every 2 minutes while the hacking was going on, dunno about prof.

So I'd put that as the most likely cause.
Ahh, that's probably it then. Fuckers.

BTW, did we ever find out who hacked 5punk and how?
Dr. kitteny berk
Morbo
Morbo
Posts: 19676
Joined: December 10th, 2004, 21:53
Contact:

Post by Dr. kitteny berk »

Current assumption is evil people and the /uploads/ thingy.
TezzRexx
Dr Zoidberg
Dr Zoidberg
Posts: 4072
Joined: February 8th, 2005, 15:54
Location: BURMINGHUM, England
Contact:

Post by TezzRexx »

Fear wrote:Were your passwords guessable?

I use Keepass to generate and store all my passwords. I tend to shy away from words or non-random data for important sites such as banks, etc. So far so good....

*touches wood*
LOLS! You touched wood! :faint:

But to the question, "Were your passwords guessable?" I severely doubt it, knowing how much Berk and Proff win at the internets.
Dr. kitteny berk
Morbo
Morbo
Posts: 19676
Joined: December 10th, 2004, 21:53
Contact:

Post by Dr. kitteny berk »

Fear wrote:Were your passwords guessable?
Yes (not guessable, but hardly super secure etc) , but the fact is, 3 people from one small site don't all get their paypal accounts hacked within a few days unless there's something more iffy at play.

Also: paypal would fix this kind of issue in a second if they moved to a security code and password system.
Fear
Zombie
Zombie
Posts: 2032
Joined: August 6th, 2006, 21:45

Post by Fear »

Was it the same password as your forums one?

It's possible they took a dump of the sql database and brute-horse'd the md5 hashed passwords?

Whilst the link seems very likely to be 5punk I can't fathom how visiting a website could have resorted in cookies for another domain being retrieved. and even then paypal doesn't remember your password *ever*, only the browser does.
Dr. kitteny berk
Morbo
Morbo
Posts: 19676
Joined: December 10th, 2004, 21:53
Contact:

Post by Dr. kitteny berk »

Fear wrote:Was it the same password as your forums one?

It's possible they took a dump of the sql database and brute-horse'd the md5 hashed passwords?
This is likely (talking to prof)
fabyak
Home-made Big Daddy
Home-made Big Daddy
Posts: 5681
Joined: October 14th, 2004, 14:02
Location: Oxford, England

Post by fabyak »

/me closes his PayPal account

never use the thing anyway
Sheriff Fatman
Optimus Prime
Optimus Prime
Posts: 1132
Joined: March 5th, 2006, 22:54

Post by Sheriff Fatman »

Dr. kitteny berk wrote:
This is likely (talking to prof)
Cracking an md5 is a bit of a bastard though isn't it?
Dr. kitteny berk
Morbo
Morbo
Posts: 19676
Joined: December 10th, 2004, 21:53
Contact:

Post by Dr. kitteny berk »

Sheriff Fatman wrote:Cracking an md5 is a bit a a bastard though isn't it?
not so much these days, especially if it's not salted.
Fear
Zombie
Zombie
Posts: 2032
Joined: August 6th, 2006, 21:45

Post by Fear »

Sheriff Fatman wrote:Cracking an md5 is a bit of a bastard though isn't it?
Because MD5 is a fixed hashing algorithm (and phpbb doesn't use a nonce) it is possible they have a massive table of well known hashed passwords.

That, and they weren't random so a dictionary or semi-dictionary based attack would take mere minutes, if not seconds.
Sheriff Fatman
Optimus Prime
Optimus Prime
Posts: 1132
Joined: March 5th, 2006, 22:54

Post by Sheriff Fatman »

Dr. kitteny berk wrote:
not so much these days, especially if it's not salted.
Crikey. MD5 was the the be-all-and-end-all of computer forensics with regard to proving that file X was the same file X on a paedo's computer.

Probably different circumstances, mind.
Fear
Zombie
Zombie
Posts: 2032
Joined: August 6th, 2006, 21:45

Post by Fear »

Sheriff Fatman wrote:
Crikey. MD5 was the the be-all-and-end-all of computer forensics with regard to proving that file X was the same file X on a paedo's computer.

Probably different circumstances, mind.
It still is, the likelihood of two files having the same md5 hash and having different content is phenomenally small.
Sheriff Fatman
Optimus Prime
Optimus Prime
Posts: 1132
Joined: March 5th, 2006, 22:54

Post by Sheriff Fatman »

Fear wrote:
Because MD5 is a fixed hashing algorithm (and phpbb doesn't use a nonce) it is possible they have a massive table of well known hashed passwords.
That's a given; but god knows how big said table would have to be to pre-empt MD5. The possibilities run into the millions.
Fear wrote:That, and they weren't random so a dictionary or semi-dictionary based attack would take mere minutes, if not seconds.
Hehe, times have changed. The last brute attack software I tested took hours to do an eight character alphanumeric password.
Dr. kitteny berk
Morbo
Morbo
Posts: 19676
Joined: December 10th, 2004, 21:53
Contact:

Post by Dr. kitteny berk »

Sheriff Fatman wrote:That's a given; but god knows how big said table would have to be to pre-empt MD5. The possibilities run into the millions.

Hehe, times have changed. The last brute attack software I tested took hours to do an eight character alphanumeric password.
Fairly huge.

http://en.wikipedia.org/wiki/Rainbow_table
ProfHawking
Zombie
Zombie
Posts: 2101
Joined: February 20th, 2005, 21:31

Post by ProfHawking »

bearing in mind that mine wouldn't have been a common word let alone being in the dictionary, i think they either were very clever about it, or have access to a botnet with large number crunching power.
Fear
Zombie
Zombie
Posts: 2032
Joined: August 6th, 2006, 21:45

Post by Fear »

Rainbow tables are extremely fast for non-salted or non-nonced hashes. (phpbb)
Making a Faster Cryptanalytic Time-Memory Trade-Off by Philippe Oechslin wrote:Using 1.4GB of data (two CD-ROMs) we can crack 99.9% of all alphanumerical passwords hashes (2 37 ) in 13.6 seconds
That was with 2003s computation power.
Dr. kitteny berk
Morbo
Morbo
Posts: 19676
Joined: December 10th, 2004, 21:53
Contact:

Post by Dr. kitteny berk »

Fear wrote:Rainbow tables are extremely fast for non-salted or non-nonced hashes. (phpbb)

That was with 2003s computation power.
Also worth noting that it doesn't care what pass you're using if it's alphanumerical, no dictionary attack needed.
Sheriff Fatman
Optimus Prime
Optimus Prime
Posts: 1132
Joined: March 5th, 2006, 22:54

Post by Sheriff Fatman »

Dr. kitteny berk wrote:
Also worth noting that it doesn't care what pass you're using if it's alphanumerical, no dictionary attack needed.
Doesn't that make it harder to crack though? I thought dictionary attacks were a piece of piss.

/slightly behind the times
ProfHawking
Zombie
Zombie
Posts: 2101
Joined: February 20th, 2005, 21:31

Post by ProfHawking »

yes i know the difference between brute-horse and dictionary, but i didnt realise rainbow tables made it so fast, it is rather worrying.
no chance of this salt in phpbb?
Post Reply