Neoseeker : News : Simple, brute-force dictionary attack was used on Twitter
0 thumbs!
#
Raynard Jan 7, 09
It's the 21st century! Use secure password's for *bleep*sake!
0 thumbs!
#
kspiess Jan 7, 09
Heck ya. Throw some damn numbers in there or something. Heck even a harmless little ^ would have come in REAL handy for Crystal.
0 thumbs!
#
Guest Jan 7, 09
This is horrible crime? I swear you news people are reporting this like GMZ hacked into the IRS and gave everyone rebate checks. With all the stuff going on in this world, the media choose 3 days to talk about freeking twitter.
0 thumbs!
#
kspiess Jan 7, 09
Damn it! I hate it when my sarcasm attempts fail miserably.

Damn news people. They are behind water fluoridation.
0 thumbs!
#
killerkid22 Jan 7, 09
yea, but its the fact that someone was able to hack into...so easily, i think is the main idea behind the story

i mean....he practicly did this by trial and error
0 thumbs!
#
hollowedsol Jan 7, 09
I agree with killer, this was a trial error method. What a stupidly simple password... why not throw in a number and several symbols while you're at it?
0 thumbs!
#
oni_hero Jan 7, 09
Title reminded me of Randy Marsh...

"I thought this was America"
0 thumbs!
#
tekmosis Jan 7, 09
ehh...saying "I thought this was 2009" and applying it to either brute force methodology or simple passwords is kinda lame. Unless you were being sarcastic in which case you can ignore this little rant.

Brute force, especially dictionary attacks are very simple to do but not the most efficient due to the time constraints it takes. But they *do* work and are still popular methods. It's not like it's out dated and is a shock that omg it's 2009 and people are still doing this?!

As for simple passwords not *everyone* is going to be the savviest when it comes to technology, no matter what year it is. Her employers can't be upset with her as it is their own liability to ensure that all employees are knowledgeable on retaining secure passwords, not to write them down, etc, etc. Also, it is a systems admin error by not logging / tracking security issues such as this.
0 thumbs!
#
kspiess Jan 7, 09
The reason I said the 2009 thing was that I thought, these days, any major website had either a: a limit of false passwords you can put it in before the system either reports you , or at least, has a limit which once broken doesn't allow you to log in for a few minutes; and to a lesser extent b: most administrators would not use such a weak password (of course this is wishful thinking.)

Allowing your system to be open to brute force attacks, which pretty much any person with a basic programming knowledge can exploit, is not very 2009, in regards to security, in my opinion.

I'm surprised that such a major website would be open to a brute force attack. I thought a most basic-level security precaution was to limit the amount of login tries someone could have in a short amount of time.
Advertisements
- This news story is archived and is closed to new comments now. -
Newsletter
Latest Inhouse
(0.1023/d/www1)