On Sun, Jun 10, 2012 at 4:55 PM, Georgi Guninski <[email protected]>wrote:
> Stumbled upon this: > http://pastebin.com/5pjjgbMt > ======= > LinkedIn Leaked hashes password statistics (@StefanVenken) > > Based on the leaked 6.5 Million hashes, > 1.354.946 were recovered within a few hours time with HashCat / Jtr and > publicly found wordlists on a customer grade laptop. > > This report was created with pipal from @Digininja > ======== > > Ironically they broke some 40 chars pwd. > > Another list that contains seemingly non-dictionary pwds is at: > > http://pastebin.com/JmtNxcnB > > And here an interesting analysis http://erratasec.blogspot.it/2012/06/linkedin-vs-password-cracking.html Best Regards > > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ >
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
