[Owasp-natal] RES: Confirmado hack no Linkedin

Noilson Caio caiogore em gmail.com
Sábado Junho 9 18:06:17 UTC 2012


No dia seguinte, o desenvolvedor do MD5 declara: "Md5crypt Password
scrambler is no longer considered safe". ri demais.

phk.freebsd.dk/sagas/md5crypt_eol.html?highlight=md5



2012/6/7 Ivanildo Galvão <ivanildo at itservices.com.br>

> Com certeza perdeu pontos, desta forma o serviço passa a ter a
> desconfiança de todos os usuários.****
>
> ** **
>
> Já mudei a minha senha e penso seriamente em sair alterando em todos os
> serviços de redes sociais e e-mails.****
>
> ** **
>
> ** **
>
> Sds,****
>
> ** **
>
> ** **
>
> ** **
>
> ** **
>
> *Ivanildo Galvão*
>
> *Consultor de Tecnologia*
>
> *MCP, MCT, MCSA, VSP, VTSP, ITIL V3*
>
> Tel. (84) 3201 2146                 | Cel. (84) 9111 8873****
>
> ivanildo at itservices.com.br    | www.itservices.com.br ****
>
> Twitter: @ivanildogalvao ****
>
> [image: Descrição: Descrição: Descrição: Descrição:
> http://t2.gstatic.com/images?q=tbn:ANd9GcQI4ZEGsNwiYIiYGnywUNOvmUzPmGhH1UHv06QxJDjryTCM3ClQOg]
>   [image: Descrição: Descrição: Descrição: Descrição:
> http://t2.gstatic.com/images?q=tbn:ANd9GcQFyGrF-fTbBPkpE1F0ZGsmGSb-QEX_75vhfFhZOlQIVX-Mg0CM]
>   [image: Descrição: Descrição: Descrição: Descrição:
> http://www.ctsblackburn.com.au/images/stories/sophos_reseller.gif]****
>
> *APC, IBM, DELL, Fortinet, Citrix, Kerio, Microsoft***
>
> ** **
>
> ** **
>
> ** **
>
> *De:* owasp-natal-bounces at lists.owasp.org [mailto:
> owasp-natal-bounces at lists.owasp.org] *Em nome de *Eduardo Coelho
> *Enviada em:* quarta-feira, 6 de junho de 2012 22:23
> *Para:* Noilson Caio
> *Cc:* owasp-natal at lists.owasp.org
> *Assunto:* Re: [Owasp-natal] Confirmado hack no Linkedin****
>
> ** **
>
> É grave.****
>
> ** **
>
> Merece um alerta, em especial para quem usa a mesma senha para diversos
> serviços diferentes.****
>
> ** **
>
> Linkedin perdeu alguns pontos. Usar hash sem salt, veio? Serio? =/****
>
> ** **
>
> ** **
>
>
> Atenciosamente,****
>
> Eduardo Coelho Lima****
>
> >> eduardocoelholima at gmail.com****
>
> http://coelho.ithub.com.br****
>
>
>
> ****
>
> 2012/6/6 Noilson Caio <caiogore at gmail.com>****
>
> é isso mesmo.
>
>
> ****
>
> LinkedIn has confirmed<http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised/>that some of the password hashes that were posted
> online<http://nakedsecurity.sophos.com/2012/06/06/millions-of-linkedin-passwords-reportedly-leaked-take-action-now/>do match users of its service. They have also stated that passwords that
> are reset will now be stored in salted hashed format. ****
>
> What is a salt? It is a string that is added to your password before it is
> cryptographically hashed. What does this accomplish? It means that password
> lists cannot be pre-computed based on dictionary attacks or similar
> techniques.****
>
> [image: Password hash with salt example]****
>
> This is an important factor is slowing down people trying to brute force
> passwords. It buys time and unfortunately the hashes published from
> LinkedIn did not contain a salt.****
>
> **[image: 60% of LinkedIn passwords cracked]**After removing duplicate
> hashes, SophosLabs has determined there are 5.8 million unique password
> hashes in the dump, or which 3.5 million have already been brute forced.
> That means over 60% of the stolen hashes are now publicly known.****
>
> We also did some additional testing of commonly used passwords that should
> never be used. We started with the list of passwords that the Conficker
> worm used<http://nakedsecurity.sophos.com/2009/01/16/passwords-conficker-worm/>to spread through Windows networks.
> ****
>
> All but two of the Conficker passwords were used by someone in the 6.5
> million user password dump. The two passwords that weren't found were
> 'mypc123' and 'ihavenopass'.****
>
> Other passwords that we found in the dump include 'linkedin',
> 'linkedinpassword', 'p455w0rd' and 'redsox'. We even found passwords that
> suggest people should know better like 'sophos', 'mcafee', 'symantec',
> 'kaspersky', 'microsoft' and 'f-secure'.****
>
> We will continue to keep Naked Security readers up to date with what is
> known as we learn more. ****
>
> It is critical that LinkedIn investigate this to determine if email
> addresses and other information was also taken by the thieves which could
> put the victims at additional risk from this attack.****
>
> *Special thanks to Beth Jones and Richard Wang from SophosLabs for their
> hard work and assistance with this post.*****
>
>
>
>
>
>
>
>
> -- ****
>
> Noilson Caio Teixeira de Araújo
> Linux Professional Institute Certification  2 - LPI000182893
> Novell Certified Linux Administrator (CLA) - 10111916
> Novell Data Center Technical Specialist
>
> http://ncaio.ithub.com.br
> http://br.linkedin.com/in/ncaio
> http://www.commandlinefu.com/commands/by/ncaio
> http://www.dicas-l.com.br/autores/noilsoncaioteixeiradearaujo.php****
>
>
>
> _______________________________________________
> Owasp-natal mailing list
> Owasp-natal at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-natal****
>
> ** **
>
> _______________________________________________
> Owasp-natal mailing list
> Owasp-natal at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-natal
>
>


-- 
Noilson Caio Teixeira de Araújo
Linux Professional Institute Certification  2 - LPI000182893
Novell Certified Linux Administrator (CLA) - 10111916
Novell Data Center Technical Specialist

http://ncaio.ithub.com.br
http://br.linkedin.com/in/ncaio
http://www.commandlinefu.com/commands/by/ncaio
http://www.dicas-l.com.br/autores/noilsoncaioteixeiradearaujo.php
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-natal/attachments/20120609/fe81023b/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.jpg
Type: image/jpeg
Size: 2147 bytes
Desc: not available
URL: <http://lists.owasp.org/pipermail/owasp-natal/attachments/20120609/fe81023b/attachment-0002.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image003.png
Type: image/png
Size: 4853 bytes
Desc: not available
URL: <http://lists.owasp.org/pipermail/owasp-natal/attachments/20120609/fe81023b/attachment-0001.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image002.jpg
Type: image/jpeg
Size: 1817 bytes
Desc: not available
URL: <http://lists.owasp.org/pipermail/owasp-natal/attachments/20120609/fe81023b/attachment-0003.jpg>


More information about the Owasp-natal mailing list