Upgrade to Pro — share decks privately, control downloads, hide ads and more …

A Song of Hashes and Dumps: What I've learned f...

A Song of Hashes and Dumps: What I've learned from cracking .br passwords

Blackhat Regional Summit São Paulo 2014 (Nov/2014)

We do a lot of password cracking these days. Hashes from owned systems pop out frequently on Pastebin and Twitter, and it is not unusual to find a nice SQL injection that allows you to dump the entire login table from a web application. However, we still use the same old wordlists and rules.

Presented during Blackhat Regional Summit São Paulo 2014, this talked aimed to provide a fresh view on password cracking research through showing positive results, drawbacks, failures, and challenges while cracking passwords from .br domains; testing the performance of some popular wordlists against different scenarios; identifying patterns and behavior of users while choosing their passwords, beyond 'qwerty'; and providing tools, scripts, rules, and wordlists to aid in cracking Brazilian passwords but useful for any language.

Read more: http://codalabs.net/gameofhashes
Code & others: https://github.com/BRDumps
Black Hat Regional Summit São Paulo: https://www.blackhat.com/sp-14/summit.html#a-song-of-hashes-and-dumps-what-ive-learned-from-cracking-br-passwords

Daniel Marques

November 25, 2014
Tweet

More Decks by Daniel Marques

Other Decks in Technology

Transcript

  1. A song of hashes and dumps WHAT I'VE LEARNED FROM

    CRACKING .BR PASSWORDS Daniel Marques Black Hat Regional Summit São Paulo November 2014
  2. Daniel Marques @0xc0da, your friendly neighbor Penetration Tester First time

    Blackhat Speaker Not a “professional” password cracker
  3. Disclaimer This research has no intention to cause any harm.

    It is only for educational purposes. Opinions on my own, so my employer or clients cannot be hold responsible for what you will see here.
  4. Scenarios No password policy 8 alphanumeric chars (uppercase + lowercase)

    6 alphanumeric + 1 special chars (uppercase + lowercase)
  5. 6 alphanum + special (uppercase + lowercase) Name@[0-9] First or

    Last name Most used special char, followed by “!”
  6. plain text in log files Username + Password (clear text)

    ~ 6K UNIQUE credentials in a single file. http://xxx.com.br/logs/xxx.log.bkp
  7. improve pastebot pastebot Dumpmon Parsing data CrackEngine White Chappel JtR

    Hashcat Wordlists Pipal Tag cloud Automated wordlist generation