如果我的一个密码被泄露了,我的其他密码也被泄露了吗?

如果你的一个密码被泄露了,这是否意味着你的其他密码也被泄露了?虽然有相当多的变量在发挥作用,问题是一个有趣的看什么使密码易受攻击,你可以做什么来保护自己。...

如果我的一个密码被泄露了,我的其他密码也被泄露了吗?

如果你的一个密码被泄露了,这是否意味着你的其他密码也被泄露了?虽然有相当多的变量在发挥作用,问题是一个有趣的看什么使密码易受攻击,你可以做什么来保护自己。

今天的问答环节是由SuperUser提供的,SuperUser是Stack Exchange的一个分支,它是一个由Q&a网站组成的社区驱动分组。

问题

超级用户读者Michael McGowan很好奇单个密码泄露的影响有多大;他写道:

Suppose a user uses a secure password at site A and a different but similar secure password at site B. Maybe something like mySecure12#PasswordA on site A and mySecure12#PasswordB on site B (feel free to use a different definition of “similarity” if it makes sense).

Suppose then that the password for site A is somehow compromised…maybe a malicious employee of site A or a security leak. Does this mean that site B’s password has effectively been compromised as well, or is there no such thing as “password similarity” in this context? Does it make any difference whether the compromise on site A was a plain-text leak or a hashed version?

如果假设的情况发生了,迈克尔应该担心吗?

答案

超级用户贡献者帮助迈克尔解决了这个问题。超级用户参与者Queso写道:

To answer the last part first: Yes, it would make a difference if the data disclosed were cleartext vs. hashed. In a hash, if you change a single character, the entire hash is completely different. The only way an attacker would know the password is to brute force the hash (not impossible, especially if the hash is unsalted. see rainbow tables).

As far as the similarity question, it would depend on what the attacker knows about you. If I get your password on site A and if I know you use certain patterns for creating usernames or such, I may try those same conventi*** on passwords on sites you use.

Alternatively, in the passwords you give above, if I as an attacker see an obvious pattern that I can use to separate a site-specific portion of the password from the generic password portion, I will definitely make that part of a custom password attack tailored to you.

As an example, say you have a super secure password like 58htg%HF!c. To use this password on different sites, you add a site-specific item to the beginning, so that you have passwords like: facebook58htg%HF!c, wellsfargo58htg%HF!c, or gmail58htg%HF!c, you can bet if I hack your facebook and get facebook58htg%HF!c I am going to see that pattern and use it on other sites I find that you may use.

It all comes down to patterns. Will the attacker see a pattern in the site-specific portion and generic portion of your password?

另一位超级用户撰稿人Michael Trausch解释了在大多数情况下,假设的情况不会引起太多关注:

To answer the last part first: Yes, it would make a difference if the data disclosed were cleartext vs. hashed. In a hash, if you change a single character, the entire hash is completely different. The only way an attacker would know the password is to brute force the hash (not impossible, especially if the hash is unsalted. see rainbow tables).

As far as the similarity question, it would depend on what the attacker knows about you. If I get your password on site A and if I know you use certain patterns for creating usernames or such, I may try those same conventi*** on passwords on sites you use.

Alternatively, in the passwords you give above, if I as an attacker see an obvious pattern that I can use to separate a site-specific portion of the password from the generic password portion, I will definitely make that part of a custom password attack tailored to you.

As an example, say you have a super secure password like 58htg%HF!c. To use this password on different sites, you add a site-specific item to the beginning, so that you have passwords like: facebook58htg%HF!c, wellsfargo58htg%HF!c, or gmail58htg%HF!c, you can bet if I hack your facebook and get facebook58htg%HF!c I am going to see that pattern and use it on other sites I find that you may use.

It all comes down to patterns. Will the attacker see a pattern in the site-specific portion and generic portion of your password?

如果您担心您当前的密码列表不够多样和随机,我们强烈建议您查看我们全面的密码安全指南:如何在您的电子邮件密码被泄露后恢复。通过重新修改你的密码列表,就好像所有密码的母亲,你的电子邮件密码,已经被泄露了一样,很容易让你的密码组合快速更新。


有什么要补充的解释吗?在评论中发出声音。想从其他精通技术的Stack Exchange用户那里了解更多答案吗?在这里查看完整的讨论主题。

 

  • 发表于 2021-04-12 03:36
  • 阅读 ( 182 )
  • 分类:互联网

你可能感兴趣的文章

7.11亿个电子邮件地址被在线spambot泄露

...和密码是否被泄露。而这不仅仅是为了那些网上的垃圾。如果您的地址在任何其他数据泄露期间泄露(包含在数据库中),您将发现。 ...

  • 发布于 2021-03-13 06:22
  • 阅读 ( 140 )

现在检查一下你的密码是否被泄露过

...来检查您计划使用的密码是否包含在过去的任何漏洞中。如果您选择的密码一直显示在数据库中,您应该考虑使用密码管理器生成更强大的密码。 ...

  • 发布于 2021-03-13 13:18
  • 阅读 ( 152 )

益百利黑暗网络扫描:你需要它,你能相信它吗?

... 我们之前已经讨论过什么是暗网,所以如果您不熟悉,我们将在这里进行总结。 ...

  • 发布于 2021-03-22 01:01
  • 阅读 ( 193 )

怪物数据泄露暴露数百万密码

... 如果你的电子邮件和/或密码没有显示,那么你就没事了。但是,如果它确实出现在“我已收到密码”上,您应该立即更改与该帐户关联的密码。您还应该避免在多个站点...

  • 发布于 2021-03-22 04:25
  • 阅读 ( 199 )

制作一个安全的密码:骰子如何重塑互联网安全

... 一些黑客根据他们知道的关于你的信息猜测你的密码。如果你不小心落入网络钓鱼骗局,你可以把他们需要的信息交给你自己!更老练的黑客会使用破解密码或记录击键的程序。 ...

  • 发布于 2021-03-27 05:04
  • 阅读 ( 202 )

你的netflix帐户被黑客入侵了吗?下一步怎么办

... 如果你怀疑你的Netflix账户被黑客入侵,继续阅读。 ...

  • 发布于 2021-03-28 05:50
  • 阅读 ( 263 )

什么是“暗网扫描”,你应该用它吗?

...用。这也有助于规避**审查。 但黑网也被用于犯罪活动。如果你打算在网上**人们信用卡和社会保险号码的数据库,你就要隐藏你的位置,这样当局就不会突袭进来。这就是为什么犯罪分子经常在黑暗的网络上**这些数据。这也...

  • 发布于 2021-04-04 06:13
  • 阅读 ( 215 )

小心:你的旧reddit密码被泄露了

如果你仍然使用与2007年相同的Reddit密码,哇:你已经使用Reddit很久了。你的密码也被泄露了。 六月份的某个时候,一个黑客侵入了一些Reddit服务器,访问了一个旧数据库。来自Reddit关于这一事件的帖子: What was accessed: A complete...

  • 发布于 2021-04-05 02:53
  • 阅读 ( 127 )

passprotect会告诉你密码是否被泄露

...让你知道你使用的密码何时是最近一次泄露的一部分。 如果您在多个站点使用密码,仅此工具无法保护您,这就是为什么您应该使用密码管理器的原因。这些帮助您为每个站点随机生成一个密码,然后以易于访问的方式存储密...

  • 发布于 2021-04-06 07:57
  • 阅读 ( 88 )

如何检查密码是否被盗

...出现在,这反过来给您有关密码可能已被泄露的信息。 如果你想得到一个电子邮件通知,如果你的电子邮件地址或用户名出现在未来的泄漏,点击“通知我”链接在页面顶部,并输入你的电子邮件地址。 您还可以搜索密码以查...

  • 发布于 2021-04-06 17:04
  • 阅读 ( 185 )
sof817
sof817

0 篇文章

相关推荐