I had a few moments this past weekend to play with an idea for visualizing the passwords used against the honeypot @jayjacobs set up. While it’s not as informative as Jay’s weekend endeavors:
it is pretty, and it satisfied my need to make a word cloud out of useful data.
The image below is of the top 500 passwords used against the honeypot and requires an SVG-capable browser and also requires horizontal scrolling, so you can view or download it standalone if there are any issues. For those generally SVG-challenged, there’s also a slightly less #spiffy PNG version to view as well.
123456 password 1234 123 12345 1 12 test test123 qwerty abc123 1234567 passwd p@ssw0rd 1qaz2wsx Password123 1q2w3e 123qwe branburica rOOt oracle qazwsx 111111 @#$% redhat 0000 user tester 1111 pass abc www 12345678 1q2w3e4r 123456789 passw0rd admin root123 master mail r00t abcd1234 Password1 postgres temp web ftp toor alex aaa asdf bill ss admin123 linux asdfgh 123qaz 123456qwerty MySQL pa55w0rd webadmin q1w2e3r4 pass123 zxcvbnm 0724939114 654321 123123 qwe123 testing testtest server 7hur@y@t3am$#@ apache temp123 mucleuscacaroot diffiehellmangroupexchangesha1 1234567890 administrator webmaster okmnji changeme qwertyuiop 000000 BUNdAS@#$RT%GQEQW#%QW vkvadaclasa 1qaz2wsx3edc p4ssw0rd rootroot carto0ns11 backup guest q1w2e3 alupigus zaq12wsx diana4ever worlddomination student admin1 test1 ftpuser dkagh@#$ Pa$$w0rd doarmata86 abc1234 123abc P@$$w0rd nagios abcdef david internet info demo oracle123 12qwaszx Ciuciuka321 michael private letmein qazwsxedc 1qa2ws3ed aicumine sirhack123 qweqwe root123456 cacutza asdf1234 andrew adrian140489 root1234 diaconusanduboris soxy1 welcome 510326mazda asd123 wwwdata metallica Tkdghkxkd_ sales qwer1234 scricideea prueba richard 1ntll1tch 1qaz@WSX asdfghjkl public 1qa2ws john tomcat KiliN6#Th3Ph03$%nix@NdR3birD mysql123 iamh4ckst4rf0r3ver router manager amanda guest123 web123 shell aceraspire 1QAZXSW2 teste sysadmin 11111 james server1 cyrus info123 default Fum4tulP0@t3Uc1d3R4uD3T0t@#$%% support robert qwerty123 user123 jessica fedora nobody 2wsx3edc tindoor355 postmaster 6gy7cg q1w2e3r4t5 zxcvbn chris 1234qwer QAZ2wsx 0933353329 root12345 1q2w3e4r5t nicole http test1234 paul p@ssword samsung danutzaa1 postfix oracle1 it00z system daniel access william computer qazwsx123 root1 data asterisk zh3I5LiK3P4rtY@v3r sonny2hack 121212 mike qnlkOF2NV7 1qaz2wsx3edc4rfv ssh4 george joshua 123surusa network P@55W0RD testuser roxiroxi kentr890 httpd qweasdzxc anna QWEASD r00t123 54321 salajan123 sex4s3xyg4y mnbvcxz snow786just188 uniserverroot2145 pass1234 qwer aaaaaa 1q2w3e4r5t6y root@# service email danny sex4plpl brian server123 trash 1qazse4 news abcdefg zaq123 camels1 alan rwwtx adm falcon #7364 angel eltmzm dnjao123 @#$ games dkagh zexzex unix adam frank nimda clamav amber secret vmware root01 library office 321 gracie squid sarah @# visitor steven mary china dave jack jean oliver pass1 dan julie test2 ben reagan carly xxx fred tim 666 sam mark asd user1 fax nick ts bin max grace %s4kural0v3 iloveyou 123321 ubuntu darwin kevin brett
Like this: Like Loading...
Related
2 Trackbacks/Pingbacks
[…] Simple Passwords (via) […]
[…] Sources: @ddsecbook @jayjacobs […]