Cracking the Code: An Analysis of WiFi Passwords in Oslo
Cracking the Code: An Analysis of WiFi Passwords in Oslo

Cracking the Code: An Analysis of WiFi Passwords in Oslo

Introduction

In the ever-evolving landscape of cyber threats, the analysis of password patterns, their vulnerabilities, and the development of enhanced security measures is more crucial than ever. In this article, we delve into an extensive dataset of 820 cracked passwords, all of which were derived from WiFi Access Points across Oslo in 2022.

This insightful journey began with Operation Bloodhound – Cracking WiFi Passwords, where we initially gathered 5800 hashes. After removing duplicates, we honed in on 3962 unique hashes. Of these, 820 were successfully cracked, marking a significant increase in our cracking rate from 13.86% in 2022 to an impressive 20.70% today.

In this piece, we shift our gaze from the technical aspects of cracking and the Open Source Intelligence (OSINT) methods used to identify WiFi owners. Instead, our spotlight is on the cracked passwords themselves. We unravel the patterns, common threads, and vulnerabilities they reveal.

Reflecting on a previous LinkedIn post, the acquisition of a NVIDIA RTX 4090 GPU was a game-changer in boosting my hash-cracking capabilities. This crucial upgrade not only increased my success rate from 18% to 20.70% since that post but also fueled my motivation to write this article. Here, I aim to share an in-depth analysis of the password patterns uncovered in Oslo’s WiFi networks.

Now, I invite you to join me in exploring the world of password analytics.We’ll explore diverse password patterns, common substrings, character types, and frequent passwords, extracting practical insights to enhance password security. Lets dive in!

Distribution of Password Lengths

Graph showing the frequency of passwords by length.

The most commonly observed password length in the dataset was 8 characters, accounting for 362 instances, followed by 9 characters (179 instances), and then 10 characters (119 instances). Passwords with lengths exceeding 13 characters were considerably less common.

Distribution of Password Patterns

The bar graph presented illustrates the varied composition of advanced password categories as a percentage of the total. The predominant category is ‘Digits Only’, demonstrating a widespread preference for numeric passwords. Following closely are ‘Digits, Uppercase & Lowercase’ and ‘Letters Only (Lowercase)’, showcasing a balance between simplicity and complexity in password choices. Other categories, including ‘Digits & Lowercase’, ‘Letters Only (Uppercase & Lowercase)’, and ‘Digits, Special, Uppercase & Lowercase’, though less prevalent, represent a notable segment of password diversity.

This categorization sheds light on the multifaceted nature of password creation. It underscores a pronounced trend towards digit-based passwords, either standalone or blended with alphabetic characters, and a less frequent but still significant use of special characters. Such insights are invaluable for developing robust password policies and enhancing overall security frameworks.

In the dataset, there are no passwords that fall under the ‘Special Characters Only’ category. This indicates that none of the passwords consist exclusively of special characters without any digits or letters. This trend suggests a user preference for including alphanumeric characters in their passwords rather than relying solely on special characters.

Top 10 Common Substrings in Passwords

The bar graph above illustrates the “Top 10 Common Substrings in Passwords”. It shows the frequency of various patterns found within a set of passwords. The pattern “123” appears to be the most common, occurring 51 times. Other patterns, such as “1”, “1234”, and “123456”, also show notable frequencies

Top 10 Most Frequent Passwords

The bar graph above displays the top 10 most frequent passwords in the dataset. It clearly shows that “222222222” is the most common password, followed by “1234567890” and “U17r4H4rd(0r3”, each with significant frequencies. This visualization highlights the popularity of certain passwords, many of which follow simple numeric sequences or common patterns, underscoring potential security concerns in password selection practices.

Key Observations and Analysis

Personal Identification: In numerous instances, the Wi-Fi network names (SSIDs) or the passwords were found to be directly linked to personal identifiers such as names, addresses, and phone numbers. This facilitated the easy identification of the network owners.

These examples have been anonymized to protect the privacy of the individuals involved. The original data contained specific personal identifiers such as names, addresses, and phone numbers, which when combined with the network details could potentially be exploited for malicious purposes. As a responsible and ethical entity, we must ensure that privacy is upheld at all times. Therefore, while we discuss these examples to educate about potential risks and encourage safer practices, we have replaced the original identifiers with fictional ones to prevent any potential misuse of the information.

Explanation:

  1. For the first one nr 1, the password is the user’s phone number, making it easier for someone to guess.
  2. For “Navnesen”, the SSID is the last name of the user, making them identifiable.
  3. For “Jane Cozy Wifi “, the SSID is a personalized phrase, which could potentially lead to identification of the owner.
  4. For SSID “45d”, the SSID was the house number and the password was the street name, making the physical location easily identifiable.
  5. For “Jenny & Jane longest reach”, the SSID contains the names of the owners, revealing their identities.

Location-Based Identification: Certain networks had their SSID inclusive of an address or apartment number. This, coupled with the geographical coordinates of the Wi-Fi signal, allowed for precise tracking of the network’s physical location and identify the owner of the wifi network faster.

Risks and Vulnerabilities: The simplicity involved in cracking these passwords and identifying network owners reveals major security risks. Personal networks with easily identifiable information can lead to breaches in privacy. Business networks, particularly those belonging to large corporations, pose an attractive target for cyber attacks. The vulnerability of the electric car brand’s Wi-Fi network represents an additional security concern.

Business Networks and Institutional Networks: Networks associated with a diverse range of entities, including a production company, the IoT network of a prominent gym chain, and the administrative network of a notable educational institution in Norway, were included in this analysis. The analysis revealed a trend of using elementary passwords, often just a sequence of numbers or basic words, across these networks. The SSIDs of these networks were frequently identifiable, pointing to a general oversight in network security practices within both the business and educational sectors.

Common Patterns in Passwords: A recurrent theme in the dataset was the use of passwords derived from well-known wordlists such as “rockyou” and “hashmob”. This trend suggests a widespread lack of strong, unique password creation strategies. The concern for network security becomes particularly acute in the context of sensitive networks, like the gym chain’s IoT system and the administrative network of the educational institution. These networks, due to their potentially high-stakes nature, are at a greater risk when relying on easily guessable or common passwords. This pattern was especially pronounced in the case of the gym chain’s IoT network and the educational institution, highlighting a critical need for strengthened password policies in such environments.

Electric Car Brand Network: A popular electric car brand’s service Wi-Fi network was also found to be easily cracked. Tests confirmed that the car would connect to the access point set up by the author, highlighting a potential security issue.

Legacy Software and Equipment: Despite most traffic being encrypted and the presence of firewalls and defender software on computers, there may be legacy software and equipment still in use. This, along with equipment on the network that either has no password or a default password, may be vulnerable to attacks.

Recommendations

  1. Stronger Password Policies: Both individuals and businesses should adopt stronger, more complex password policies. Passwords should be long, include a mix of character types, and avoid common patterns or identifiable personal information.
  2. Regular Security Audits: Regularly update and audit network security, especially for businesses, to prevent unauthorized access.
  3. Education on Network Security: Raise awareness about the importance of network security and the risks of using weak or easily guessable passwords.
  4. Limit Personal Information in SSIDs: Avoid using personal information in network names to reduce the risk of identification and potential targeted attack.
  5. Use of Advanced Security Measures: For businesses, especially those handling sensitive data, the implementation of advanced security measures like WPA3, VPNs, and regular monitoring of network activity is recommended.
  6. Human Error Reduction: Implement password managers in organizational settings to minimize risks associated with password reuse and human error.
  7. Crafting the Unbreakable WiFi Password: Complexity is Key. Aim for a password that is both lengthy (over 16 characters) and intricate, blending upper and lower case letters, numbers, and symbols. This combination not only makes it challenging for brute force attacks but also ensures the password isn’t easily guessable. Steer clear of using only one to three dictionary words and personal information to further enhance security
  8. Utilize Passphrases: Consider using a long passphrase – a sequence of words or other text – which can be easier to remember and just as secure as random characters if sufficiently long and complex.

Leave a Reply

Your email address will not be published. Required fields are marked *