Upgrade to Pro — share decks privately, control downloads, hide ads and more …

PANIC Project: One Year Later

Avatar for Jacob Jacob
September 27, 2012

PANIC Project: One Year Later

Slides for Brucon 2012 Workshop. For more info see http://panic-project.com

Avatar for Jacob

Jacob

September 27, 2012
Tweet

More Decks by Jacob

Other Decks in Technology

Transcript

  1. Disclaimer • Views and Opinions shared here are our own

    and not our employers, past, present, or (obviously) future.
  2. Who We Are • biosshadow - Fearless leader • Benson

    - Resident code monkey • Matt - Security guy
  3. We would like to Thank • Travis McCrea - Designer

    of our website • Justin Elze - sysadmin and ideas • Ashleigh Baumgardner - stats advice • Mike Kelly of Spiderlabs - access to leaks • Anyone who provided data and cracked passwords for us.
  4. The Beginning • May 2011 - Idea born as a

    blog post • September 2011 - "announced" at Brucon 2011 Lightning Talks as multi-part project
  5. But... • It's still quite useful • Unique as a

    leak clearinghouse • We can work around some of the issues (more on this later)
  6. The Project in 4 Bullet Points • Automate Collection of

    Leaks via Pastebin and Twitter • Clean and remove all data that is not emails or passwords • Enter the data in a centralized database • Run analytics on the database to find interesting patterns
  7. The process • Collecting leaks • Cleaning the passwords •

    Importing the data • Run Analysis • Find patterns • ??? • Profit?
  8. Collecting Passwords • Data collected via Twitter API and scraping

    Pastebin • Plan to add the top 5 pastebin Sites • And eventually as many as we can find
  9. Tools for finding leaks • PasteLert http://bit.ly/PS9uYh • PastEnum http://bit.ly/e95kmE

    • PasteMon http://bit.ly/x4DS0H • PasteGrep http://bit.ly/PmUtNk • Pine Siskin http://bit.ly/QElc8f
  10. Cleaning The Data • Leaks contain information that is private

    and/or unneeded by the project (address, full names, and phone numbers) • We remove all data besides passwords, hashes, and emails
  11. Automation is key • There is a LOT of data

    to go through • Script ALL the things! • Profit ??? • The problem is non-standard dumps
  12. Importing Data • Handcrafted CSV files • Rake task to

    introduce them to rails env • Calculate leak-specific stats
  13. Run Analysis and Find patterns • Analysis run en masse

    and leak by leak • We let the data tell the story
  14. ??? • Automate bruteforcing o Dedicated server or EC2 o

    GPU goodness with oclhashcat • Add more leak sources • An interactive dataset viewer • More data, faster
  15. ??? contd. • IRCbot to find links dropped by Anonymous

    and other similar groups • Reports - quarterly for anyone to use to help your their company or clients
  16. Profit? • No plans to monetize anything • All donations,

    monetary or otherwise, go into the project
  17. Data • Most interesting attribute is "strength" • How hard

    is it to crack? o Length o Presence in dictionary o Complexity of character set
  18. Calculating Strength • First crack at it: complexity ^ length

    • Strength value is far unmanageably large • log(complexity ^ length) o Still monotonically increasing with strength o Log lets you graph it nicely
  19. Top Twenty! 123456789 12345678 123456 password 11111111 0 1234567890 123123123

    abc123 qwerty 88888888 welcome 12345 111111 monkey princess lifehack iloveyou sunshine n/a
  20. How You can Help the Project • Requests o Features

    o Analytics • Notify us of public leaks, big and small • Help with our code - Github pull requests are welcome