• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

DropBox hack reveals 68 million user passwords

September 4, 2016 by Ryan P Boyce 5 Comments

This article is about the release of account info for about 68 million DropBox users. The breach occurred in 2012 but now, 4 years later, the raw passwords are being released on the web. There are a few things I find interesting about the article. First, it mentions that what allowed the breach to take place back in 2012 was that one of its employees passwords was obtained by hackers. It is safe to assume that the hackers used a form of social engineering to obtain this password. What I also found interesting were the encryption methods used to encrypt the actual passwords- the SHA-1 algortihm and the Bcrypt hashing function. The SHA-1 hashing algorithm, it appears, is all but extinct as the time and effort it takes to break this encryption method have grown much smaller. What I think is most interesting here is that, in 2012, SHA-1 was a respectable encryption method. The use of Bcrypt enforced the hashing of the passwords but hackers  were still able to spend four years breaking the encryption. It becomes very clear from this example that, once data is obtained by hackers, all bets are off. The means by which data is encrypted today is sure to become extinct in years to come. I think the biggest takeaway here is that strengthening perimeter defenses-making it extremely difficult for hackers to gain entrance to systems at all-is the most important aspect of cyber defense.

Article: http://thehackernews.com/2016/08/dropbox-data-breach.html

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Ioannis S. Haviaras says

    September 4, 2016 at 10:45 am

    Ryan,

    This is a great article. Its interesting how it takes so long to crack the encryption key and that DropBox is releasing another statement to its users regarding the breach that was 4 years ago. After reading this I definitely went and changed my password on DropBox. The end of the article tells us that we should use password managers. I have personally been using a password manager for years now its called DashLane and it has significantly improved my password security.

    Log in to Reply
  2. Loi Van Tran says

    September 4, 2016 at 5:32 pm

    Thanks Ryan for this very interesting article. As a user of Dropbox and other cloud storage platforms, it brings us to the realization that the data and information we put on the web is never completely safe. It reminds us that we should be careful what we upload or submit on the internet, whether it’s account sign-ups or social media posts. Once information is posted online, we are no longer the sole proprietor of that information and we entrust the third parties that elicited our information to protect it. Like mentioned in class, there is no way to guarantee 100% security in any information system. Systems are made by us and somebody with the right means and tools will discover the vulnerabilities to exploit.

    Log in to Reply
  3. Mengxue Ni says

    September 4, 2016 at 7:45 pm

    This is an interesting article, Ryan. I don’t use Dropbox often but I do use google drive as my primary document backup. I worried about the data breach at the beginning, but it is so easy and convenience to use. So I just forgot about the risk. It is shocking that only one password can allow hackers to do this much. Firewall is not the only thing can protect us anymore. We should look beyond the risk and take care of our data at anytime since there is no perfect way to stop the data breach.

    Log in to Reply
  4. Mengqi He says

    September 5, 2016 at 7:25 pm

    It’s an interesting article, Ryan. Even though changing password is one of the easiest and most effective way to protect our information against hacking, most people would not like to change their password often. It is because people usually don’t have enough awareness of the vulnerability of keeping using the same password. If no one remind them, they won’t remember to change by themselves. It’s even true to me. I don’t change my password often except for the TU account, since Temple reminds me to change password every half a year. Another reason is that people cannot remember their passwords if they change a lot, especially we have so many accounts for different websites with different password requirements. The article suggests us to use a password manager, but another problem will raise, what if the password manager is attacked? We can see there is no 100% safe way to protect our information from hacking. Hacking is always easier than anti-hacking.

    Log in to Reply
  5. Wade Mackey says

    September 5, 2016 at 11:38 pm

    Changing of passwords is an issue of some controversy. If you have to change regularly, people tend to come up with simpler passwords, or some kind of formula or system so they can keep track.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in