textfiles/computers/password.txt

214 lines
11 KiB
Plaintext
Raw Normal View History

2021-04-15 11:31:59 -07:00
VERY good advice about your password.
Originally sent on STaTus BBS, and reprinted here by permission of the author.
Message : 9359 [Open] 3-31-91 9:40am
From : Murray Moffatt
To : Jon Clarke (x)
Subject : #9344 hi
Sig(s) : 1 (General)
Speaking of passwords, I think it's probably a good idea that someone
should advise our new (and not so new) users on the art of picking
passwords. Anybody volunteer? Speak now or forever hold your peace? No?
Ok, I'll take it on myself to do this.
Your password is the only thing that stands between you and some nasty
haker-type person. Your username is common knowledge to everybody that
uses the system, so you must keep your password secret. This means not
telling people, or lending it to people, or writing it down and sticking
it to your screen, or anything like that.
It also means that you must choose your password carefully. Recent
experiements have shown that 25% of people choose passwords that can
easily be hacked. The method that is most often used to hack a password is
called the 'dictionary hack'. The hacker gets a dictionary and goes
through it trying each word as the password. Of course he doesn't do this
by hand, he writes a little prog to do it, and the dictionary is a file of
words. So, if you use a word that is found in the dictionary, you'll be
found out. Just stop for a second and think if any of your passwords are
words that are found in the dictionary?
So, how do you combat this? Simple, don't choose words from the
dictionary! But at the same time it's not a good idea to use dates,
number plates, phone numbers, etc. The best ways are to make us words.
Simply string two or more words together to form a new word. For example,
BLADE and RUNNER may be in the dictionary, but I'll bet that BLADERUNNER
or BLADE-RUNNER or BLADE.RUNNER isn't! You can also use the initial
letters from words of a phrase. For example, Three Blind Mice Ran Up The
Clock would translate to a password of TBMRUTC. Looks like a nonsense
word, doesn't it? But it means something to you, you just have to remember
the phrase.
Also, remember not to use the same password on different systems. I know
that this is a hard thing not to do, but try to have different passwords
on each board you use. And change the passwords regularly. Where I work
all the passwords expire after 30 days, and you're forced to enter a new
one. Some systems, like IBM systems, remember the last 5 or so passwords
that you've used, and won't let you re-use them. They also force you to
have at least one digit in the password and other things as well.
Oh, and one last thing. There are a whole lot of commonly used passwords.
These passwords are used so often by people, that the hacker will always
try these first.
Heres a list that I grabbed of Usenet that someone posted of the most
commonly used passwords:
alt/security/ 369
From: jsax@cdp.UUCP
Subject: Re: OVERUSED PASSWORDS
Date: 9 Jan 91 05:08:00 GMT
Nf-ID: #R:cdp:1159900002:cdp:1159900003:000:6649
Nf-From: cdp.UUCP!jsax Jan 8 21:08:00 1991
Taken from
'A Novice's Guide to Hacking- 1989 Edition'
by
The Mentor LOD/H
Password List
=============
aaa daniel jester rascal
academia danny johnny really
ada dave joseph rebecca
adrian deb joshua remote
aerobics debbie judith rick
airplane deborah juggle reagan
albany december julia robot
albatross desperate kathleen robotics
albert develop kermit rolex
alex diet kernel ronald
alexander digital knight rosebud
algebra discovery lambda rosemary
alias disney larry roses
alpha dog lazarus ruben
alphabet drought lee rules
ama duncan leroy ruth
amy easy lewis sal
analog eatme light saxon
anchor edges lisa scheme
andy edwin louis scott
andrea egghead lynne scotty
animal eileen mac secret
answer einstein macintosh sensor
anything elephant mack serenity
arrow elizabeth maggot sex
arthur ellen magic shark
asshole emerald malcolm sharon
athena engine mark shit
atmosphere engineer markus shiva
bacchus enterprise marty shuttle
badass enzyme marvin simon
bailey euclid master simple
banana evelyn maurice singer
bandit extension merlin single
banks fairway mets smile
bass felicia michael smiles
batman fender michelle smooch
beauty fermat mike smother
beaver finite minimum snatch
beethoven flower minsky snoopy
beloved foolproof mogul soap
benz football moose socrates
beowulf format mozart spit
berkeley forsythe nancy spring
berlin fourier napoleon subway
beta fred network success
beverly friend newton summer
bob frighten next super
brenda fun olivia support
brian gabriel oracle surfer
bridget garfield orca suzanne
broadway gauss orwell tangerine
bumbling george osiris tape
cardinal gertrude outlaw target
carmen gibson oxford taylor
carolina ginger pacific telephone
caroline gnu painless temptation
castle golf pam tiger
cat golfer paper toggle
celtics gorgeous password tomato
change graham pat toyota
charles gryphon patricia trivial
charming guest penguin unhappy
charon guitar pete unicorn
chester hacker peter unknown
cigar harmony philip urchin
classic harold phoenix utility
coffee harvey pierre vicky
coke heinlein pizza virginia
collins hello plover warren
comrade help polynomial water
computer herbert praise weenie
condo honey prelude whatnot
condom horse prince whitney
cookie imperial protect will
cooper include pumpkin william
create ingres puppet willie
creation innocuous rabbit winston
creator irishman rachmaninoff wizard
cretin isis rainbow wombat
daemon japan raindrop yosemite
dancer jessica random zap
----snip-----snip-----------
The Internet Worm used a lot of the above passwords in it's first
password pass. After that it just used the dictionary, etc.
It'd really be worth it to check this list when people change
passwords. That plus 1-2 month password expire is good security.
It's amazing how many people use SECRET or MODEM for their
password. Not to mention using their first name..
Jon "God hates me."
vector0!jon@sactoh0.SAC.CA.US "Hate 'im back, works for me."
...ames!pacbell!sactoh0!vector0!jon
alt/security/ 372
From: shipley@remarque.berkeley.edu (Pete Shipley)
Subject: Re: OVERUSED PASSWORDS
Date: 10 Jan 91 01:58:06 GMT
Organization: Processed People for a Processed America
In article <1159900002@cdp> jsax@cdp.UUCP writes:
>
>I received this from a respondent to my article on alt.security
>recently. Is your password on the list? (Tell me! Tell me!)
>
> These are passwords that were used by the Internet worm, and
>are included in COPS.
>
>
>aaa
I person would be crazy to admit there password is on that list,
because you will be able to crack that persons account in less then two
minutes using telnet.
Note that list is used my everyone, it is effective on non-educated
users but since every password checker written in the last five years
has this list (or the list the internet worm was built from) it is not
as useful as it once was for password cracking. I suggest aquiring a
list of female names, I have had the most sucess with those lists.
My 8mm tape collection used a list of common last names, female names,
male names, the worm list, /usr/dict/words (from SunOS 4.1) and the
word list from Webster's 7th Collegiate Dictionary, plus a list I put
together (contains default password some OS's come with).
-Pete
Pete Shipley:
email: shipley@berkeley.edu Flames:
cimarron@postgres.berkeley.edu
uunet!lurnix!shipley or ucbvax!shipley or apple!nli!{root,shipley}
Spelling corections: /dev/null Quote: "Anger is an energy"
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::