Penetration Testing mailing list archives
RE: passw0rd trial limit
From: "Andy Meyers" <andy.meyers () hushmail com>
Date: Sat, 24 Jun 2006 09:14:55 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This might help....ive posted this before.. Here is a link (its cached from google) that a trainer from Foundstone showed me (his website) of the 51 most common passwords that worked 80% of the time to penetrate a network http://66.102.7.104/search?q=cache:N60gEe8eS8UJ:hig.beesecure.org/r005_passw ord_guessing_works.html+51+common+passwords+beesecure&hl=en&client=firefox-a if the link doesn't work here is the article itself: There are many "Default Password Lists" on the internet that are fairly comprehensive. Many of them are too big. Over the past few years, I've compiled a personal list of passwords that I've run across. When doing internal assessments against NT environments, one of these 51 passwords get me in 80% of the time. I'm interested in adding to this list. Please send me any common passwords (for Domain Admin's) you may have run into. Begin list: 123456 1234567 12345678 123asdf Admin admin administrator asdf123 backup backupexec changeme clustadm cluster compaq default dell dmz domino exchadm exchange ftp gateway guest lotus money notes office oracle pass password password! password1 print qwerty replicate seagate secret sql sqlexec temp temp! temp123 test test! test123 tivoli veritas virus web www KKKKKKK End List. When I brutre force, I use username:username first, then this list. Do *not* forget to include a blank line in the above password list. Many accounts have blank passwords. That's it. Credits to Aaron Higbee, CISSP aaron_at_beesecure.org - ----------- Ashes PGP: http://ashesbelow.ath.cx/public.txt - -----Original Message----- From: ceyhun [mailto:jhun39 () gmail com] Sent: Friday, June 23, 2006 3:40 PM To: pen-test () lists securityfocus com Subject: passw0rd trial limit hi i am trying to pen test a web site site has a login page and all the usernames are known the passw0rd length is fixed and 6 characters long i think with a brute force attack it wold be easy to login as any user, but the problem is when a user enters wrong paaw0rd more than five times he/she can only login for aboout 2 hours later how this obstacle can be overcomed do you have any idea? by the way remote server accepts another user login wehther you have exceeded trial limit or not so i think it is not related with the ip filtering - ---------------------------------------------------------------------------- - -- This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. - ---------------------------------------------------------------------------- - -- -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify/ Version: Hush 2.5 wkYEARECAAYFAkSdZP8ACgkQnZu7yPmLRpAWqwCgqZqQib5d4hy1CfV0nw8Ca3gCqvYA n3QKkBB9MrAWIU2p4mz8TfiDLonH =cCcT -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- passw0rd trial limit ceyhun (Jun 24)
- Re: passw0rd trial limit funkys0ul (Jun 24)
- Re: passw0rd trial limit AgentSmith15 (Jun 25)
- Re: passw0rd trial limit Alice Bryson (Jun 24)
- RE: passw0rd trial limit Andy Meyers (Jun 25)
- Re: passw0rd trial limit Eliah Kagan (Jun 25)
- RE: SPAM-LOW: passw0rd trial limit Mohsin Ahmed (Jun 27)
- Re: SPAM-LOW: passw0rd trial limit Christopher Schwardt (Jun 27)
- <Possible follow-ups>
- Re: passw0rd trial limit Zed Qyves (Jun 26)
- RE: passw0rd trial limit Beauford, Jason (Jun 26)
- Re: passw0rd trial limit Zed Qyves (Jun 27)
- Re: passw0rd trial limit funkys0ul (Jun 24)