Using OSINT to obtain password candidates
It is possible (in fact, somewhat common) that reviewing breach data does not provide us the password we need. So, we may need to resort to cracking to retrieve the data we have been approved to recover. But can we use OSINT to try and make this process more likely to be successful?
Absolutely.
Many people will construct passwords based on things they can easily remember. As we discussed in the previous chapter, mandating password complexity and length can lead users to create easily memorable passwords, often resorting to using words that can be easily recalled. What kind of words are readily recalled? Things we use in everyday life, like the names of our favorite sports teams, our family, our pets, or our hobbies – or even words related to our occupation.
If you are reading this and are blushing because you’ve created passwords in the past using these kinds of words…don’t be embarrassed. We all have done...