TrustedSec - Weak in, Weak out: Keeping Password Lists Current

THIS POST WAS WRITTEN BY @NYXGEEK

When performing brute-force attacks, it’s our first instinct to go to the current season and year, i.e., Winter20, Winter2020. But it’s important to keep in mind that many organizations use a 90-day password change window, and 90 days can be a deceptively long time. For instance, as of today, February 25, 2020, the oldest passwords in such an organization would land in the end of November. It’s possible that a user has a November19 or Fall2019 password set.

To make the task of creating weak password lists a little easier, I’ve created weakpasswords.net (and south.weakpasswords.net for our friends in the Southern Hemisphere). This site displays a list of candidate passwords for brute-force attacks based on the current date and is updated daily via a cronjob.

The code is available on GitHub (https://github.com/nyxgeek/weakpass_generator) and is easily modified. Each month has an array of base words defined. For example, November has the following base words:

November
Fall
Autumn
Winter
Thanksgiving

There is another array defined that consists of popular suffixes. These include:

SHORTYEAR (e.g., 19)
LONGYEAR (e.g., 2019)
SHORTYEAR!
LONGYEAR!
1
123
@SHORTYEAR
@LONGYEAR

Again, this is easily modified to include your favorite endings. Happy hacking!

The post Weak in, Weak out: Keeping Password Lists Current appeared first on TrustedSec.



from TrustedSec https://www.trustedsec.com/blog/weak-in-weak-out-keeping-password-lists-current/

Comments

Popular posts from this blog

Krebs - NY Charges First American Financial for Massive Data Leak

KnowBe4 - Scam Of The Week: "When Users Add Their Names to a Wall of Shame"