<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>logIt &#187; privacy</title>
	<atom:link href="https://lakm.us/logit/tag/privacy/feed/" rel="self" type="application/rss+xml" />
	<link>https://lakm.us/logit</link>
	<description>Log Around The Clock</description>
	<lastBuildDate>Sat, 06 Jun 2015 14:17:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Alas my LinkedIn password is in the file! (Howto check compromised password)</title>
		<link>https://lakm.us/logit/2012/06/alas-linkedin-password-file-howto-check-compromised-password/</link>
		<comments>https://lakm.us/logit/2012/06/alas-linkedin-password-file-howto-check-compromised-password/#comments</comments>
		<pubDate>Tue, 12 Jun 2012 08:59:10 +0000</pubDate>
		<dc:creator>Arif</dc:creator>
				<category><![CDATA[Web Apps]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[python]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[shell script]]></category>
		<category><![CDATA[socialmedia]]></category>

		<guid isPermaLink="false">http://lakm.us/logit/?p=393</guid>
		<description><![CDATA[When LinkedIn privacy breach was about to be revealed during Yuval Ne&#8217;eman workshop in Tel Aviv University, suddenly the timeline trends were that of friends, telling people to change LinkedIn password. Both were separate issues and of course the privacy breach was then subsided from people&#8217;s attention. To tell you the truth, as a secret [...]]]></description>
				<content:encoded><![CDATA[<p>When <a href="http://blog.skycure.com/2012/06/linkedout-linkedin-privacy-issue.html" title="LinkedOut - A LinkedIn Privacy Issue" target="_blank">LinkedIn privacy breach</a> was about to be revealed during Yuval Ne&#8217;eman workshop in Tel Aviv University, suddenly the timeline trends were that of friends, telling people to <a href="http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised/" title="LinkedIn Blog" target="_blank">change LinkedIn password</a>. Both were separate issues and of course the privacy breach was then subsided from people&#8217;s attention. To tell you the truth, as a secret admirer of conspiracy theory (whether I admit it or not), this coincident was just too perfectly timed. But, I&#8217;m also curious whether my password was among the stolen 6,458,020 (yes: 6,4 millions) uploaded by the hacker in hashed <a href="http://en.wikipedia.org/wiki/SHA-1" title="http://en.wikipedia.org/wiki/SHA-1" target="_blank">SHA-1</a> without the user name.</p>
<div class="wp-caption alignnone" style="width: 460px"><a href="http://blog.skycure.com/2012/06/linkedout-linkedin-privacy-issue.html"><img alt="linkedin-uploading-contact-resized-skycure-dot-com.png" src="../../../../images/linkedin-uploading-contact-resized-skycure-dot-com.png" title="Snapshot of uploaded contact data from calendar (skycure.com)" width="420" height="197" /></a><p class="wp-caption-text">Snapshot of uploaded contact data from calendar (skycure.com)</p></div>
<p>There is not other way but to check my password against the <code>combo_not.txt</code> found via <a href="http://www.filestube.com/" title="Filestube.com" target="_blank">Filestube</a>. People already posted howto check this, the easiest way is doing <a href="http://news.ycombinator.com/item?id=4076768" title="Y Hacker News" target="_blank">a single line in the shell</a>:</p>

<div class="wp_syntax"><div class="code"><pre class="bash" style="font-family:monospace;">$ <span style="color: #7a0874; font-weight: bold;">printf</span> bandito <span style="color: #000000; font-weight: bold;">|</span> openssl sha1 <span style="color: #000000; font-weight: bold;">|</span> <span style="color: #c20cb9; font-weight: bold;">cut</span> <span style="color: #660033;">-c10-</span> <span style="color: #000000; font-weight: bold;">|</span> <span style="color: #c20cb9; font-weight: bold;">grep</span> <span style="color: #660033;">-f</span> - combo_not.txt
00000d40df69b72328229d2425714f40d7d9a7a3</pre></div></div>

<p>Bingo! a match there for the password &#8220;bandito&#8221; (I choose this randomly expecting some person out there is using it). Another way (for comparison as I&#8217;m no security expert) is by this short python script (slightly altered from <a href="http://wordpress.phobostechnology.com/?p=149" title="LinkedIn Passwords – Change them" target="_blank">Phobos Technology blog post</a>):</p>

<div class="wp_syntax"><table><tr><td class="line_numbers"><pre>1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
</pre></td><td class="code"><pre class="python" style="font-family:monospace;"><span style="color: #483d8b;">&quot;&quot;&quot;
Save this file as linkedin_hash.py and ensure it's
in the same folder as combo_not.txt
Usage: python linkedin_hash.py hunter2
&quot;&quot;&quot;</span>
<span style="color: #ff7700;font-weight:bold;">from</span> hashlib <span style="color: #ff7700;font-weight:bold;">import</span> sha1
<span style="color: #ff7700;font-weight:bold;">import</span> <span style="color: #dc143c;">sys</span>
password = <span style="color: #dc143c;">sys</span>.<span style="color: black;">argv</span><span style="color: black;">&#91;</span><span style="color: #ff4500;">1</span><span style="color: black;">&#93;</span>
hsh = sha1<span style="color: black;">&#40;</span>password<span style="color: black;">&#41;</span>.<span style="color: black;">hexdigest</span><span style="color: black;">&#40;</span><span style="color: black;">&#41;</span>
<span style="color: #ff7700;font-weight:bold;">print</span> <span style="color: #483d8b;">&quot;SHA-1: %s&quot;</span> <span style="color: #66cc66;">%</span> hsh
x = <span style="color: #ff4500;">0</span>
<span style="color: #ff7700;font-weight:bold;">for</span> line <span style="color: #ff7700;font-weight:bold;">in</span> <span style="color: #008000;">open</span><span style="color: black;">&#40;</span><span style="color: #483d8b;">'combo_not.txt'</span>,<span style="color: #483d8b;">'r'</span><span style="color: black;">&#41;</span>:
    <span style="color: #ff7700;font-weight:bold;">if</span> hsh == line.<span style="color: black;">strip</span><span style="color: black;">&#40;</span><span style="color: black;">&#41;</span>:
        x += <span style="color: #ff4500;">1</span>
    <span style="color: #ff7700;font-weight:bold;">elif</span> <span style="color: #483d8b;">&quot;00000&quot;</span> + hsh<span style="color: black;">&#91;</span><span style="color: #ff4500;">5</span>:<span style="color: black;">&#93;</span> == line.<span style="color: black;">strip</span><span style="color: black;">&#40;</span><span style="color: black;">&#41;</span>:
        x += <span style="color: #ff4500;">1</span>
        <span style="color: #ff7700;font-weight:bold;">print</span> <span style="color: #483d8b;">&quot;Matching line: %s&quot;</span> <span style="color: #66cc66;">%</span> line
<span style="color: #ff7700;font-weight:bold;">print</span> <span style="color: #483d8b;">&quot;Number of matches: %d&quot;</span> <span style="color: #66cc66;">%</span> x</pre></td></tr></table></div>

<p>My verdict is: <strong>my password is on the list</strong> and I&#8217;m considering a leap of faith from devoted conspiracy believer.</p>
<p>PS: I don&#8217;t find that &#8220;password&#8221; or &#8220;123456&#8243; as common passwords used by many people.<br />
PPS: A side story: Indonesians are found to be using weakest passwords (as <a href="http://bit.ly/JGECVM" title="Indonesia has weakest computer passwords: Researcher | The Jakarta Post">research over Yahoo ID revealed</a>)</p>
]]></content:encoded>
			<wfw:commentRss>https://lakm.us/logit/2012/06/alas-linkedin-password-file-howto-check-compromised-password/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
