Follow
undefined
Your profile
Compose post
Account Settings
View Dashboard
Logout
MY BLOGS
How I’d Hack Your Weak Passwords
1,146,9902
John Pozadzides
Filed to: SECURITY
PASSWORDS
PRIVACY
PASSWORD SECURITY
TOP
FEATURE
GIZMODO
KOTAKU
FLESHBOT
12/16/10 9:01am
Share to Kinja
Share to Facebook
Share to Pinterest
Share to Twitter
Go to permalink
How I’d Hack Your Weak Passwords
Internet standards expert, CEO of web company iFusion Labs, and blogger John Pozadzides knows a thing or two about password security—and he knows exactly how he'd hack the weak passwords you use all over the internet.
Photo remixed from subcircle.
Note: This isn't intended as a guide to hacking *other people's* weak passwords. Instead, the aim is to help you better understand the security of your own passwords and how to bolster that security. We originally published this piece back in March, but in light of our recent security breach, it seemed more applicable than ever.
FAQ: Compromised Commenting Accounts on Gawker Media
Read more
If you invited me to try and crack your password, you know the one that you use over and over for like every web page you visit, how many guesses would it take before I got it?
Let's see… here is my top 10 list. I can obtain most of this information much easier than you think, then I might just be able to get into your e-mail, computer, or online banking. After all, if I get into one I'll probably get into all of them.
Your partner, child, or pet's name, possibly followed by a 0 or 1 (because they're always making you use a number, aren't they?)
The last 4 digits of your social security number.
123 or 1234 or 123456.
"password"
Your city, or college, football team name.
Date of birth – yours, your partner's or your child's.
"god"
"letmein"
"money"
"love"
Statistically speaking that should probably cover about 20% of you. But don't worry. If I didn't get it yet it will probably only take a few more minutes before I do…
Hackers, and I'm not talking about the ethical kind, have developed a whole range of tools to get at your personal data. And the main impediment standing between your information remaining safe, or leaking out, is the password you choose. (Ironically, the best protection people have is usually the one they take least seriously.)
One of the simplest ways to gain access to your information is through the use of a Brute Force Attack. This is accomplished when a hacker uses a specially written piece of software to attempt to log into a site using your credentials. Insecure.org has a list of the Top 10 FREE Password Crackers right here.
So, how would one use this process to actually breach your personal security? Simple. Follow my logic: