As many readers already know, Linked In had a password database leak. Since Linked In’s implementation of password hashing didn’t use salt, a variety of methods including rainbow tables and brute force can be used to guess the passwords. There’s even a handy website called leakedin.org that computes the password hash and checks to see if the resulting scrambled password is within the leaked set.
I thought it’d be fun to try to guess some passwords just based on intuition alone, using LeakedIn to check the guesses. Here’s some of the more entertaining passwords that are in the database: ‘obama2012’, ‘Obama2012’, ‘paladin’, ‘linkedinsucks’, ‘fuckyou’, ‘godsaveus’, ‘ihatemyjob’, ‘ihatejews’ (tsk tsk), ‘manson’, ‘starbucks’, ‘qwer1234’, ‘qwerty’, ‘aoeusnth’ (hello fellow dvorak user!), ‘bigtits’ (really?), ‘colbert’, ‘c0lbert’, ‘bieber’, ‘ilovejustin’, ’50cent’, ‘john316’, ‘john3:16’, ‘John3:16’, ‘1cor13’, ‘psalm23’, ‘exodus20’, ‘isiah40’, ‘Matthew6:33’, ‘hebrews11’ (bible verses are quite popular passwords!).
Interestingly, there is no ‘romney2012’ or any variant thereof.