Notices

Top 10 Hackable Passwords

Old 05-16-2010, 04:49 AM
  #1  
Senior Member
Thread Starter
 
Join Date: Feb 2003
Location: Jacksonville, Florida, US
Posts: 14,527
Default Top 10 Hackable Passwords

So fess up - how many have used one of these!

====================

Top 10 Passwords You Should Never Use

Are Your Passwords as Secure as You Think?
Researchers from the University of Maryland's A. James Clark School of Engineering in College Park have quantified how frequently unsecured computers are the victims of hacker attacks.

Here's the shocking news: On average, they happen to each unsecured computer every 39 seconds -- that's more than 2,000 times a day.

Hackers use a string of common passwords and user names to penetrate unsecured PCs. If you thought you were being clever by using your user name as your password, note this: Fully 43 percent of all password-guessing attempts simply re-entered the user name.


The top 10 most common passwords:
1. Your user name
2. Your user name followed by 123
3. 123456
4. password
5. 1234
6. 12345
7. passwd
8. 123
9. test
10. 1

On TV and in film, hackers have been portrayed as people with grudges who target specific institutions and manually try to break into their computers. But in reality, study leader Michel Cukier says, "Most of these attacks employ automated scripts that indiscriminately seek out thousands of computers at a time, looking for vulnerabilities. Our data provide quantifiable evidence that attacks are happening all the time to computers with Internet connections. The computers in our study were attacked, on average, 2,244 times a day."

The team set up weak security on four Linux computers with Internet access, then recorded what happened as the individual machines were attacked. They discovered the vast majority of attacks came from relatively unsophisticated hackers using "dictionary scripts," a type of software that runs through lists of common usernames and passwords attempting to break into a computer.

The top 10 most common user names:
1. root
2. admin
3. test
4. guest
5. info
6. adm
7. mysql
8. user
9. administrator
10. oracle

What do hackers do once they gain access to your computer?
This was the most common sequence of actions:
-- Check the accessed computer's software configuration.
-- Change the password.
-- Check the hardware and/or software configuration again.
-- Download a file.
-- Install the downloaded program.
-- Run the downloaded program.

What are the hackers trying to accomplish?
"The scripts return a list of 'most likely prospect' computers to the hacker, who then attempts to access and compromise as many as possible," Cukier says. "Often they set up 'back doors' -- undetected entrances into the computer that they control -- so they can create 'botnets,' for profit or disreputable purposes."

A botnet is a collection of compromised computers that are controlled by autonomous software robots answering to a hacker, who manipulates the computers remotely. Botnets can act to perpetrate fraud or identity theft, disrupt other networks or damage computer files, among other things.
Menzies is offline  
Old 05-16-2010, 05:57 AM
  #2  
Senior MemberCaptains Club Member
 
Join Date: Dec 2007
Posts: 15,654
Default

Surprised that qwerty1 isn't on that list. look at your keyboard; you could type it in while in the dark or on horseback.
bamaboy473 is offline  
Old 05-16-2010, 06:21 AM
  #3  
Senior MemberCaptains Club Member
 
Join Date: Nov 2004
Location: Amelia Island, FL
Posts: 4,668
Default

Originally Posted by bamaboy473 View Post
Surprised that qwerty1 isn't on that list. look at your keyboard; you could type it in while in the dark or on horseback.
I think I now know Ricks password!
Reel Boobs is offline  
Old 05-16-2010, 06:32 AM
  #4  
Senior MemberCaptains Club Member
 
Join Date: Dec 2007
Posts: 15,654
Default

so now you can see how crappy I did in the market last week
bamaboy473 is offline  
Old 05-16-2010, 07:06 AM
  #5  
Senior Member
 
Join Date: Jun 2009
Location: Charleston, SC
Posts: 2,292
Default

guessing a password isn't "hacking". hacking actually takes skill and deep understanding of computer operation
wildgeechi is offline  

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are On
Refbacks are Off


Thread Tools
Search this Thread