Honeypot Hijinks: Unveiling the Passwords Hackers Haven’t Breached Yet!
DShield honeypots attract cybercriminals like bees to honey. To analyze their password attempts, an intern developed a tool using HaveIBeenPwned’s API to identify passwords not seen in breaches. Surprisingly, 7.4% of passwords were unseen, shedding light on hacker targets and innovations in password mutations. They really need a new hobby.

Hot Take:
Who knew that cybercriminals had such a creative streak? Draden Barwick’s honeypot research uncovers a treasure trove of quirky and unique passwords that have managed to evade the clutches of the HaveIBeenPwned database. It’s like finding a batch of artisanal passwords in a world of mass-produced P@ssw0rds. Who would’ve thought that “deploy@2023” could become a sought-after masterpiece in the password art gallery? Maybe we should start crowdfunding a password museum!
Key Points:
– Draden Barwick developed a tool to uncover passwords not found in known breaches.
– The tool uses HaveIBeenPwned’s API to identify unique, unseen passwords.
– The method involved parsing logs from DShield honeypots and leveraging SHA1 hashes.
– From 51,601 passwords, 16,210 were unique, and 1,196 were unseen by HIBP.
– Password patterns revealed include variations on “deploy” and “password.”