IWETHEY v. 0.3.0 | TODO
1,095 registered users | 1 active user | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New Why you shouldn't let your browser remember passwords.
It makes it easier for viruses to get at them...

http://raidersec.blo...asswords-and.html

Interesting. But check the comments, too.

(via Peter Vogel on G+ - https://plus.google....posts/88Aitts957h )

Cheers,
Scott.
New same reason you shouldn't store them on disk
Any opinions expressed by me are mine alone, posted from my home computer, on my own time as a free American and do not reflect the opinions of any person or company that I have had professional relations with in the past 58 years. meep
New Somebody has to, nicht wahr?
If I don't have my username and password on my PC, but the place I'm connecting to does, the problem still exists. If someone gets inside, the information is at risk.

One would think that the cloud is run by people who know what they're doing, so accounts are protected, but we know of too many cases where that isn't true.

IIRC, Kerberos tries to minimize this problem by passing tokens around. But the server still has a database of valid passwords from which it constructs tokens.

Defense in depth makes sense, but it's too easy to forget all this stuff...

Cheers,
Scott.
New LastPass has been cracked before, IIRC
Regards,
-scott
Welcome to Rivendell, Mr. Anderson.
New <boggle>
New Re: <boggle>
http://news.cnet.com...-20060464-83.html
Regards,
-scott
Welcome to Rivendell, Mr. Anderson.
New Thanks.
New Database of valid passwords?
Or valid password hashes?


New Dunno.
I suppose with public and private keys that there are ways to know whether a username and password are valid without having and storing the actual original values.

But AFAIK, the problem remains. If the system is compromised, then it's only a matter of time before account information can compromised as well.

But I'm no expert on this stuff...

Cheers,
Scott.
New Makes little difference
http://arstechnica.c...f-your-passwords/

ArsTechnica gave three experts a list of over 16000 cryptographic password hashes. The best one recovered 90% of the plaintext passwords.

The list of "plains," as many crackers refer to deciphered hashes, contains the usual list of commonly used passcodes that are found in virtually every breach involving consumer websites. "123456," "1234567," and "password" are there, as is "letmein," "Destiny21," and "pizzapizza." Passwords of this ilk are hopelessly weak. Despite the additional tweaking, "p@$$word," "123456789j," "letmein1!," and "LETMEin3" are equally awful. But sprinkled among the overused and easily cracked passcodes in the leaked list are some that many readers might assume are relatively secure. ":LOL1313le" is in there, as are "Coneyisland9/," "momof3g8kids," "1368555av," "n3xtb1gth1ng," "qeadzcwrsfxv1331," "m27bufford," "J21.redskin," "Garrett1993*," and "Oscar+emmy2."
New Neat. Thanks.
New shouldnt store passwords on your local disk
unprotected is where I was going. How the other end of you connection stores passwords is of interest also. Ensure that your login/password cannot be trivially tracked back to you. boxley and derivatives are used socially, financials are considerably different. Easy to hack boxley, wouldn't help with my protected connections
Any opinions expressed by me are mine alone, posted from my home computer, on my own time as a free American and do not reflect the opinions of any person or company that I have had professional relations with in the past 58 years. meep
New Yup.
New Re: Why you shouldn't let your browser remember passwords.
;DR (except to see its about the lovely thing I love to hate)

Windows API, nice.

People will never learn, even when you show them. Why bother, I see people using IE v6 on their WindowsXP machines because they saw a newer version on a friends machine and were told it screwed something up... so don' let it upgrade.

Oh and what about those that still do not have auto-fetch of patches turned on... because they read sometime in the mid 2000s that you can't trust Microsoft and have to approve all the upgrades yourself *ONLY*.

Like they have the ability to comprehend what is going on, read the KB and judge if its a good thing. Heck, there are people asking me how to get the Certificate Warnings from their bank having an unrecognized Certificate Authority/Issuer, because they haven't updated the Certificate store in 5+ years.

Yeah, whatever.

edit: stupid stray mouse click...
--
greg@gregfolkert.net
PGP key 1024D/B524687C 2003-08-05
Fingerprint: E1D3 E3D7 5850 957E FED0 2B3A ED66 6971 B524 687C
Expand Edited by folkert June 23, 2013, 09:05:27 AM EDT
     Why you shouldn't let your browser remember passwords. - (Another Scott) - (13)
         same reason you shouldn't store them on disk -NT - (boxley) - (11)
             Somebody has to, nicht wahr? - (Another Scott) - (8)
                 LastPass has been cracked before, IIRC -NT - (malraux) - (3)
                     <boggle> -NT - (Another Scott) - (2)
                         Re: <boggle> - (malraux) - (1)
                             Thanks. -NT - (Another Scott)
                 Database of valid passwords? - (pwhysall) - (3)
                     Dunno. - (Another Scott)
                     Makes little difference - (scoenye) - (1)
                         Neat. Thanks. -NT - (Another Scott)
             shouldnt store passwords on your local disk - (boxley) - (1)
                 Yup. -NT - (Another Scott)
         Re: Why you shouldn't let your browser remember passwords. - (folkert)

Powered by Dorian Gray's picture!
61 ms