Van Heerden, Renier PVorster, JS2009-04-202009-04-202009-03Van Heerden, RP and Vorster, JS. Statistical analysis of large passwords lists, used to optimize brute force attacks. 4th International Conference on Information Warfare and Security. Cape Town, South Africa; 26-27 March 2009, pp 16978-1-906638-28-3http://hdl.handle.net/10204/33284th International Conference on Information Warfare and Security. Cape Town, South Africa, 26-27 March 2009The use of passwords has become endemic in everyday life, and passwords have penetrated most aspects of modern life. The purpose of this paper was to investigate the types of information that can be deduced from password lists, where such lists can be obtained and whether the information obtained can be used to aid brute force password attacks. The World Wide Web and other Internet related search methods were used to obtain password lists. Researchers found that Peer to Peer networks have the most information available. From previous studies and the World Wide Web, the ten most popular passwords from different systems were obtained. Not surprisingly, “password” , “123” and “abc” were found to be the most common passwords. Researchers also obtained the default passwords used by hardware manufacturers from the World Wide WebenPasswordsBrute force attacksWorld Wide WebPasswords cracking systemPassword listNetworksInformation Warfare and SecurityStatistical analysis of large passwords lists, used to optimize brute force attacksConference PresentationVan Heerden, R. P., & Vorster, J. (2009). Statistical analysis of large passwords lists, used to optimize brute force attacks. http://hdl.handle.net/10204/3328Van Heerden, Renier P, and JS Vorster. "Statistical analysis of large passwords lists, used to optimize brute force attacks." (2009): http://hdl.handle.net/10204/3328Van Heerden RP, Vorster J, Statistical analysis of large passwords lists, used to optimize brute force attacks; 2009. http://hdl.handle.net/10204/3328 .TY - Conference Presentation AU - Van Heerden, Renier P AU - Vorster, JS AB - The use of passwords has become endemic in everyday life, and passwords have penetrated most aspects of modern life. The purpose of this paper was to investigate the types of information that can be deduced from password lists, where such lists can be obtained and whether the information obtained can be used to aid brute force password attacks. The World Wide Web and other Internet related search methods were used to obtain password lists. Researchers found that Peer to Peer networks have the most information available. From previous studies and the World Wide Web, the ten most popular passwords from different systems were obtained. Not surprisingly, “password” , “123” and “abc” were found to be the most common passwords. Researchers also obtained the default passwords used by hardware manufacturers from the World Wide Web DA - 2009-03 DB - ResearchSpace DP - CSIR KW - Passwords KW - Brute force attacks KW - World Wide Web KW - Passwords cracking system KW - Password list KW - Networks KW - Information Warfare and Security LK - https://researchspace.csir.co.za PY - 2009 SM - 978-1-906638-28-3 T1 - Statistical analysis of large passwords lists, used to optimize brute force attacks TI - Statistical analysis of large passwords lists, used to optimize brute force attacks UR - http://hdl.handle.net/10204/3328 ER -