Hotmail: Your password was too long, so we fixed it for you
Earlier this year, about 6.5 million LinkedIn account password hashes were published on a hackers’ forum. The hashes were simple SHA1 digests computed from the user’s passwords, as stored into the LinkedIn backend infrastructure.
It didn’t take long for hackers to start cracking them, with over half of them cracked in almost no time.
There are two main reasons why such fast cracking was possible:
* the usage of the SHA1 function itself * fast GPUs
Let’s take a look look at both.
Read more: Hotmail: Your password was too long, so we fixed it for you
Story added 21. September 2012, content source with full text you can find at link above.