TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

LeakedIn

253 pointsby ams1almost 13 years ago

54 comments

pbreitalmost 13 years ago
Now there's a great idea! Provide your password to some random site purporting to check if your password's been compromised.
评论 #4075842 未加载
评论 #4075573 未加载
评论 #4075823 未加载
评论 #4075552 未加载
评论 #4075581 未加载
评论 #4076334 未加载
评论 #4075824 未加载
评论 #4076100 未加载
评论 #4078420 未加载
评论 #4075696 未加载
评论 #4075688 未加载
eddieplan9almost 13 years ago
I made something almost the same (including name!), except all check is done in browser:<p><a href="http://crackedin.s3-website-us-east-1.amazonaws.com/" rel="nofollow">http://crackedin.s3-website-us-east-1.amazonaws.com/</a><p>And it's hosted on S3 so it is faster :)
评论 #4075800 未加载
评论 #4075817 未加载
评论 #4077465 未加载
hungalmost 13 years ago
I quickly wrote a script to do this locally, not the most efficient, but I'm at work ;)<p><a href="https://github.com/hungtruong/LinkedIn-Password-Checker" rel="nofollow">https://github.com/hungtruong/LinkedIn-Password-Checker</a>
评论 #4075818 未加载
评论 #4076559 未加载
评论 #4077346 未加载
评论 #4076097 未加载
评论 #4075757 未加载
fendrakalmost 13 years ago
One suggestion: make the input box have a type of 'password'. I was only a bit put-off by seeing my plaintext password staring me in the face!
评论 #4075608 未加载
yelloblacalmost 13 years ago
How about submitting the hashes over https, at the very least somebody could be sniffing the traffic from your site and gathering the hash list for themselves..
Splinesalmost 13 years ago
We need a "wasmylinkedinpasswordleaked.com" with &#60;h1&#62;yes&#60;/h1&#62; as the content.
评论 #4076142 未加载
cpgalmost 13 years ago
Tangencially related to some of the comments in this thread.<p>Amahi (my startup) started experiencing lots of spamming accounts a little while ago. We started using blacklists and some heuristics to detect the spammers. Then we logged the attempts.<p>Some interesting things emerge.<p>* The vast majority of them have "super123" as the password * The vast majority use emails from china (163.com, qq.com, etc.) * They try twice in a row if the first attempt fails * They try regularly<p>The suspicion is that they then sell these accounts in bulk for later action. We have seen them have these accounts sitting idle, with occasional logins to check if they still work. Then later they pounce, posting spam links, etc.<p>The level of sophistication of all this is rather troublesome ...
sontekalmost 13 years ago
I think its safer to test yourself than randomly typing your password in on websites =)
评论 #4075521 未加载
joshuahedlundalmost 13 years ago
Mine was not in the list. I had a non-dictionary password with letters and numbers, 8 characters, and it was at least several months old.<p>(If we can collect enough data points of whose passwords are on it or not, how old they are, and how complex the password was, we should be able to narrow down a potential date range for the list and the odds that the compromised list is full or partial.)
评论 #4075572 未加载
评论 #4075904 未加载
评论 #4075498 未加载
评论 #4075833 未加载
mrlasealmost 13 years ago
"Your password was leaked and cracked. Sorry, friend."<p>Well that's lovely. Just changed my LinkedIn password so hopefully no one had a chance to take advantage of that. Luckily I very recently switched to a new password scheme so my other accounts should be secure too.
lucb1ealmost 13 years ago
Brilliant. Next time I want someone's password I'll create a page similar to this ("check if your password was leaked!") and pretend to spam my entire contact list while my target is really the only person receiving it.<p>No seriously, how in the world can we trust this website with our password? They don't even claim to keep your password a secret. For all we know this is a follow-up scam to extend the 6.5mil hacked hashes.<p>Having a very quick glance at the HTML source, it seems they hash it before it's sent to the site to check, but it easily might have been a scam. Or turn into one with a probability of 1 in 10, that still gets them many passwords while remaining to be trusted.
elchiefalmost 13 years ago
Good news, the following passwords where not leaked:<p><pre><code> password asdfasdf (whew!) linkedinpassword </code></pre> The following were:<p><pre><code> password1 password$ linkedin a1a1a1a1 drowssap 12345678</code></pre>
评论 #4076733 未加载
ajacksifiedalmost 13 years ago
Beat me to my more tounge-in-cheek <a href="http://ismylinkedinpasswordleaked.com" rel="nofollow">http://ismylinkedinpasswordleaked.com</a> ;)
Hethriralmost 13 years ago
I think the much bigger risk here is password re-use, think if some CEO used the same password for their website/email?<p>Also, torrent: <a href="http://www.seedpeer.me/download/linkedin_hashes/ad1e93a1aee28165daab22945b29352ec7518c71" rel="nofollow">http://www.seedpeer.me/download/linkedin_hashes/ad1e93a1aee2...</a>
siavoshalmost 13 years ago
I wish I could down vote or delete this article. Regardless of the creator's intentions, there are a lot of non-techie people on HN (like one of my co-workers) who used this site to check their linkedin password. It reinforces fatal security habits.
olemartinorgalmost 13 years ago
Oh.. Didn't know anyone already made this - i also made a tool, but it doesn't send your whole hash over the wire (only the last 4 chars). <a href="http://olemartin.org/linkedin-passwords/" rel="nofollow">http://olemartin.org/linkedin-passwords/</a>
评论 #4075897 未加载
评论 #4075911 未加载
评论 #4075916 未加载
评论 #4075914 未加载
dslalmost 13 years ago
www.wasmylinkedinpasswordstolen.com is much better.
fozzlealmost 13 years ago
I'm really enjoying testing completely silly passwords against the leaks.<p>'pooppants' is a confirmed hit. "World's Largest Professional Network". I like to imagine some suit with a cigar logging into look for new hires with that one.
Splinesalmost 13 years ago
My autogenerated password was in the list, and not cracked.<p>I've changed it anyway on linkedin.
评论 #4077168 未加载
david_shawalmost 13 years ago
Even if this is a completely trusted and secure site, <i>why</i> would you not use SSL for something like this?<p>Transport layer security is a serious issue, especially for people prone to password reuse.
facorreiaalmost 13 years ago
If your hash is not on that list, it's bad news. There are indications that the hacker published only the hashes he needed help with. The others were more easily decoded.
JEVLONalmost 13 years ago
It is helpful to have a unique password for each meaningful service you use. That way the black-hats can't compromise your other accounts using the same password.
andrewpialmost 13 years ago
My (previous) password was randomly generated, and it was on this list. Fortunately I had already changed it when I read about the breach earlier on Wednesday.
x1almost 13 years ago
huh, I have a linked in account that I don't check often and my password was on that list. Luckily it was specific to linkedin. I don't believe this is just a small percentage of users. Oh and I never received an email like the blog states (<a href="http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised/" rel="nofollow">http://blog.linkedin.com/2012/06/06/linkedin-member-password...</a>)... odd...
wouterinhoalmost 13 years ago
I'm wondering about the legality of this. If you take an (assumed) stolen dump of sensitive data and turn it into a webservice, could you get in trouble?
jhardingalmost 13 years ago
You should add a note on the page that lets people know that checking a password takes a minute or two.<p>EDIT: Actually never mind, seems like it's much faster now.
评论 #4075461 未加载
anon01almost 13 years ago
I think its interesting to see what kind of passwords were in there. "password" was of course in there, "password1" was not, "password2" was....
namankalmost 13 years ago
Well the fun I'm having with this is checking all the trivial passwords that people still use despite warnings.<p>No, mine isn't in the list.
will_work4tearsalmost 13 years ago
Somebody had the password test123. Lol. I'm going to go see what other crazy simple passwords people have used.
mark-ralmost 13 years ago
The link appears to be down now, either it served its nefarious purpose or it's a victim of its own success.
ig1almost 13 years ago
The site should tell people to change their password anyway regardless of whether it's in the list or not.
ronikalmost 13 years ago
I'm amazed someone took the time to develop this without thinking of the potential trust issues involved.
btbalmost 13 years ago
Ahh interesting. My password was on the list(I changed it before checking).<p>old password: ve78d9k6k<p>4c1433ca9d58d7d7ba00658d209583d8edde144a
johnchristopheralmost 13 years ago
If you leave the page opened long enough some random(?) characters fill the input field. What for ?
imcottonalmost 13 years ago
There is a tracking service on the results page keep sending out everything you've just submited.
dfreyalmost 13 years ago
My password was leaked and cracked. It is also the same password I use on Hacker News. :((((
therandomguyalmost 13 years ago
If any of your had "password" as your password, it has been compromised. I just checked.
alexlitovalmost 13 years ago
Your password was leaked, but it has not (yet) been cracked. Fingers crossed.
jes5199almost 13 years ago
yipes - apparently that site sends up an unsalted sha1 of your password. If leaked unsalted sha1s are worth being worried about, then typing your password into this site is just as bad as the original leak
评论 #4075617 未加载
tazzy531almost 13 years ago
Reminds me of the Seinfeld/MovieFone episode...<p>"Why don't you just tell me your password..."
KenCochranealmost 13 years ago
You could use the service to see if your new password was already hacked..
lifthrasiiralmost 13 years ago
Heck, isn't it supposed to use type="password" in its input element?
Melugalmost 13 years ago
If leaked in saves my password, I'm leaked now.
ryeguy_24almost 13 years ago
Genius. LinkedIn needs more of you apparently.
bevanalmost 13 years ago
A better solution:<p>www.wasmylinkedinpasswordleaked.com
cristianocdalmost 13 years ago
please make the wordlist you're getting everyone generate for you available to download!<p>thanks
bweialmost 13 years ago
Thanks. I was a victim.
twodayslatealmost 13 years ago
I was compromised :(
exitalmost 13 years ago
how can they tell what was leaked but not cracked?
评论 #4075877 未加载
weakwirealmost 13 years ago
"binladen" was actualy used for a password at linkedin lol!
jherikoalmost 13 years ago
this smacks of a scam...
STRiDEXalmost 13 years ago
Someone used "georgebush"
lollancf37almost 13 years ago
lol
its_so_onalmost 13 years ago
Sorry, I don't mean to be harsh, but this concept is pretty much dead on arrival.<p><i>"Check if your hash is still private and secure by sending us your hash."</i><p>Well, even if the hash <i>was</i> secure, it isn't now!<p>(Unless you:<p>O get the whole database into the client<p>O ask the user to:<p>o reload the URL in PRIVATE browsing mode<p>o DISCONNECT from the network<p>o test the results with javascript<p>o close the whole browser<p>o reopen the browser<p>o finally, clear flash cookies (how do I even do that?)<p>o Only then reconnect to the network<p>All to prevent you from either reading the results afterward or, as regards instructions to disconnect from the network, somehow changing or making a mistake in the javascript, perhaps after we or others have verified and ok'd it.)<p>If the only answer to the objection against giving you the hash is that you don't ask for the username, you might as well ask for the password plaintext.<p>Sorry, the concept is pretty much dead on arrival.<p>Still, way to ship. (or 'nice shipping.' Should be our secret handshake :). Good luck on the next concept.
评论 #4076065 未加载