Along side weekend I ran hashcat to my servers resistant to the md5 hashes in the eHarmony deceive

A Hacker’s Angle

Something that is fascinating to note, is the fact the eHarmony passwords which use a character is uppercased. This will help reduce the keyspace and you can lets more effective brute push code checks.

Once a couple days regarding one another dictionary and brute push periods, I’ve found 1071380 passwords. Listed here are the newest stats you to definitely pipal (by Robin Wood aka ) put.

Top 10 passwords PHIL4 = 2 (0.0%) PROV3 = 2 (0.0%) JER29 = 2 (0.0%) FREETOBEME = 2 (0.0%) MAR141991 = 1 (0.0%) KEZEA = step 1 (0.0%) LEJKA = step 1 (0.0%) BILHA = 1 (0.0%) JENBA = step 1 (0.0%) POMAA = step 1 (0.0%)

Top 10 ft terms lisa = 254 (0.02%) chris = 221 (0.02%) tina = 196 (0.02%) eric = 188 (0.02%) nana = 167 (0.02%) mother = 163 (0.02%) usmc = 161 (0.02%) emma = 158 (0.01%) mike = 154 (0.01%) lola = 146 (0.01%)

Password size (length bought) 2 = dos (0.0%) 3 = dos (0.0%) 4 = step three (0.0%) 5 = 46628 (cuatro.35%) six = 253347 (%) 7 = 279971 (%) 8 = 200416 (%) 9 = 133066 (%) 10 = 90838 (8.48%) eleven = 35970 (step three.36%) 12 = 18727 (1.75%) thirteen = 7974 (0.74%) 14 = 4173 (0.39%) 15 = 277 (0.03%)

Code size (number purchased) 7 = 279971 (%) six = 253347 (%) 8 = 200416 (%) 9 = 133066 (%) 10 = 90838 (8.48%) 5 = 46628 (cuatro.35%) 11 = 35970 (step three.36%) several = 18727 (step 1.75%) 13 = 7974 (0.74%) fourteen = 4173 (0.39%) fifteen = 277 (0.03%) cuatro = 3 (0.0%) dos = dos (0.0%) 3 = 2 (0.0%)

Leer más