I forgot about phishing scams, that may explain it.

From: Jesse DuPont 
Sent: Wednesday, May 25, 2016 7:19 PM
To: [email protected] 
Subject: Re: [AFMUG] OT I un-screwed myself

I suspect they're either compromised with something logging keys or they keep 
falling for phishing scams.


Jesse DuPont

Network Architect
email: [email protected]
Celerity Networks LLC

Celerity Broadband LLC
Like us! facebook.com/celeritynetworksllc

Like us! facebook.com/celeritybroadband


On 5/25/16 6:13 PM, Ken Hohhof wrote:

  What I often wonder about is the people whose email credentials get 
compromised.

  Our email server bans an IP address for 60 minutes after 10 wrong attempts, 
so I don’t think it’s a brute force attack.  It did occur to me that a botnet 
could be used for a bruteforce attack from many different IP addresses.

  But then it would happen to everyone, which it doesn’t.  It’s usually the 
same small group of people.  And not necessarily with passwords that are 
trivial to guess like 1234.

  My best guess is either their computer is compromised and has been mined for 
stored passwords, or they use the same password lots of places and one of those 
got compromised.

  Stuff like man-in-the-middle attacks grabbing plaintext passwords seems too 
spy-vs-spy for spammers.

  Anybody have a more educated guess or even actual knowledge of how spammers 
keep getting certain peoples passwords?


  From: Eric Kuhnke 
  Sent: Wednesday, May 25, 2016 6:35 PM
  To: [email protected] 
  Subject: Re: [AFMUG] OT I un-screwed myself

  
https://diogomonica.com/posts/password-security-why-the-horse-battery-staple-is-not-correct/



  On Wed, May 25, 2016 at 4:21 PM, Nate Burke <[email protected]> wrote:

    I'm late to the thread, but this seems topical if someone hasn't already 
posted it.

    https://xkcd.com/936/


    On 5/25/2016 6:14 PM, Robert Andrews wrote:

      Hence how the employee of a certain slot machine almost made himself 
rich..  Alas, greed was more powerful that intellect..  Yet there may be 
unknown people out there that are not greedy that are to this day using the 
predictability of RNG's to keep the beer fridge filled and the tax man at bay...

      On 05/25/2016 03:54 PM, Eric Kuhnke wrote:

        for serious applications, generating cryptographically sound "random"
        numbers is quite a hard computer science problem...

        https://wiki.archlinux.org/index.php/Random_number_generation

        one of the main methods of attacking a cryptosystem is if the adversary
        knows that the RNG used to produce the keys is not truly random, but
        have some element of predictability in it.



        On Wed, May 25, 2016 at 3:10 PM, Ken Hohhof <[email protected]
        <mailto:[email protected]>> wrote:

            I think I’ll start a business selling random numbers.
            Who’s to say 12345 isn’t a random number?
            Wait, this sounds a lot like the fortune cookie business.
            *From:* Cassidy B. Larson <mailto:[email protected]>
            *Sent:* Wednesday, May 25, 2016 4:11 PM
            *To:* [email protected] <mailto:[email protected]>
            *Subject:* Re: [AFMUG] OT I un-screwed myself
        
http://www.telegraph.co.uk/technology/2016/01/21/11-year-old-girl-sets-up-business-selling-secure-passwords-for-2/


              On May 25, 2016, at 3:07 PM, Chuck McCown <[email protected]
              <mailto:[email protected]>> wrote:
              I unscrewed myself.

              In windows file explorer, there is a view option that has a
              preview option.
              With preview selected you get the contents of a file on the right
              side of the screen.

              I was trying various combinations of my password and noticed that
              on one of the tries, the preview pane showed some content.
              After a few more tries I discovered that putting a zero in front
              of the alt code allowed the preview to show content.
              The file still would not open, but I could cut and paste from the
              preview pane and I got it all.

              Sometimes you luck out.

              -----Original Message----- From: Chuck McCown
              Sent: Wednesday, May 25, 2016 3:04 PM
              To: [email protected] <mailto:[email protected]>
              Subject: Re: [AFMUG] OT I screwed myself

              baby monkey puppy

              -----Original Message----- From: Chuck McCown
              Sent: Wednesday, May 25, 2016 2:53 PM
              To: [email protected] <mailto:[email protected]>
              Subject: Re: [AFMUG] OT I screwed myself

              I'll say.

              For a new password I am considering:
              inside housing puppets stay warm
              oxygen puppet dagger manganese
              electricity wire wrapped around the anus
              Dong porcelain l swear

              -----Original Message----- From: Seth Mattinen
              Sent: Wednesday, May 25, 2016 2:50 PM
              To: [email protected] <mailto:[email protected]>
              Subject: Re: [AFMUG] OT I screwed myself

              On 5/25/16 13:36, Chuck McCown wrote:

                My oldest son is a computer security specialist / forensic guy.

                He was telling my my super complicated password was not so 
secure.
                He cracked it pretty easy.  He suggested I add an alt code.

                So I did.  Now, neither one of us can open the file.
                Guess alt codes in passwords for some Office products cause big
                problems.

                Arrgh.....



              But it's secure now, technically.








Reply via email to