{"id":29622,"date":"2019-10-10T14:36:00","date_gmt":"2019-10-10T14:36:00","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30572\/Forum-Cracks-The-Vintage-Passwords-Of-Ken-Thompson-And-Other-Unix-Pioneers.html"},"modified":"2019-10-10T14:36:00","modified_gmt":"2019-10-10T14:36:00","slug":"forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/","title":{"rendered":"Forum Cracks The Vintage Passwords Of Ken Thompson And Other Unix Pioneers"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/10\/unearthing-passwords-800x450.jpg\" alt=\"Forum cracks the vintage passwords of Ken Thompson and other Unix pioneers\"><\/p>\n<div class=\"caption-credit\">Aurich Lawson \/ Getty<\/div>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\">\n<h4 class=\"comment-count-before\"><a title=\"86 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/information-technology\/2019\/10\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/?comments=1\">reader comments<\/a><\/h4>\n<p><a title=\"86 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/information-technology\/2019\/10\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/?comments=1\"><span class=\"comment-count-number\">110<\/span> <span class=\"visually-hidden\">with 86 posters participating<\/span><\/a><\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/div>\n<\/aside>\n<p>As one of the original versions of <a href=\"https:\/\/arstechnica.com\/gadgets\/2019\/08\/unix-at-50-it-starts-with-a-mainframe-a-gator-and-three-dedicated-researchers\/\">Unix<\/a>, BSD is an ancient operating system. So it shouldn\u2019t come as a surprise that it used what are, by today\u2019s standards, strange, even ridiculous security. For one, the hashing function protecting passwords, though state of the art 40 years ago, is now trivial to crack. Stranger still, the password hashes of some BSD creators were included in publicly available source code. And then, there are the passwords people chose.<\/p>\n<p>Last week, technologist Leah Neukirchen reported finding a source tree for BSD version 3, circa 1980, and <a href=\"https:\/\/inbox.vuxu.org\/tuhs\/87bluxpqy0.fsf@vuxu.org\/\">successfully cracking passwords of many of computing\u2019s early pioneers<\/a>. In most of the cases the success was the result of the users choosing easy-to-guess passwords.<\/p>\n<p>BSD co-inventor Dennis Ritchie, for instance, used \u201cdmac\u201d (his middle name was MacAlistair); Stephen R. Bourne, creator of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bourne_shell\">Bourne shell<\/a> command line interpreter, chose \u201cbourne\u201d; Eric Schmidt, an early developer of Unix software and now the executive chairman of Google parent company Alphabet, relied on \u201cwendy!!!\u201d (the name of his wife); and Stuart Feldman, author of Unix automation tool <a href=\"https:\/\/en.wikipedia.org\/wiki\/Make_(software)\">make<\/a> and the first <a href=\"https:\/\/en.wikipedia.org\/wiki\/Fortran_77\">Fortran<\/a> compiler, used \u201caxolotl\u201d (the name of a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Axolotl\">Mexican salamander<\/a>).<\/p>\n<p>Weakest of all was the password for Unix contributor Brian W. Kernighan: \u201c\/.,\/.,\u201d\u2014representing a three-character string repeated twice using adjacent keys on a QWERTY keyboard. (None of the passwords included the quotation marks.)<\/p>\n<p>But there were at least five plaintext passwords that remained out of reach. They included those belonging to Turkish computer scientist \u00d6zalp Babao\u011flu, Unix software developer Howard Katseff, and crucial Unix contributors Tom London and Bob Fabry. But the uncracked hash that seemed to occupy Neukirchen the longest was the password used by Ken Thompson, another Unix co-inventor.<\/p>\n<p>\u201cI never managed to crack ken&#8217;s password with the hash ZghOT0eRm4U9s, and I think I enumerated the whole 8 letter lowercase + special symbols key space,\u201d Neukirchen reported in the above-linked thread, posted to the Unix Heritage Society mailing list. \u201cAny help is welcome.\u201d<\/p>\n<h2>From cutting edge to dangerously obsolete<\/h2>\n<p>I\u2019ll get to the results later, but first, a discussion of Descrypt, the default hashing algorithm for the BSD 3 operating system. When it debuted in 1979, Descrypt represented the cutting edge of password hashing. Chief among the improvements: it was the first hashing function to use cryptographic salt\u2014which is a randomly chosen text string appended to the password\u2014designed to prevent identical plaintext inputs from having the same hash string. It was also the first to subject plaintext inputs to multiple hashing iterations. With 25 iterations, this so-called key-stretching process significantly increased the time and computation required for attackers to crack the hashes.<\/p>\n<p>Descrypt was deprecated more than 20 years ago, however, as cracking tools grew ever more powerful and better functions came into being. By today\u2019s standards, Descrypt is woefully inadequate (though sadly <a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/10\/hack-on-8-adult-websites-exposes-oodles-of-intimate-user-data\/\">sometimes still used<\/a>, much to end users\u2019 detriment).<\/p>\n<p>Descrypt limits passwords to just eight characters, a constraint that makes it all but impossible for end users to choose truly strong credentials. And the salt Descrypt uses provides just 12 bits of entropy, the equivalent of two printable characters. That tiny salt space makes it likely that large databases will contain thousands of hash strings that attackers can crack simultaneously, since the hash strings use the same salt.<\/p>\n<p>Jeremi M. Gosney, a password security expert and CEO of the password-cracking firm <a href=\"https:\/\/www.terahash.com\/\">Terahash<\/a>, told Ars that Descrypt is so weak and antiquated that one of his company\u2019s 10-GPU <a href=\"https:\/\/terahash.com\/#appliances\">Inmanis<\/a> appliances (price: almost $32,000) could besiege a Descrypt hash with 14.5 billion guesses per second (the rigs can be clustered to achieve faster results). The speed of just one rig is enough to brute force the entire Descrypt keyspace\u2014which, due to practical limitations, was about 2<sup>49<\/sup> in 1979\u2014in less than 10 hours, and even less time when using cracking tools, such as wordlists, masks, and mangling rules. <a href=\"https:\/\/crack.sh\/des_crypt\/\">This site<\/a> will also crack a Descrypt hashe for as little as $100.<\/p>\n<p>The weaknesses meant it was inevitable the remaining uncracked hashes Neukirchen posted would be deciphered. But since most of the fellow forum members weren\u2019t seasoned password crackers, they seemed to use less efficient techniques. On Wednesday\u2014six days after Neukirchen asked for help\u2014forum member Nigel Williams <a href=\"https:\/\/inbox.vuxu.org\/tuhs\/tqkjt9nn7p9zgkk9cm9d@localhost\/T\/#me42cd5165f026f0d12bd2734662e6787e8da3cc7\">provided Thompson\u2019s plaintext password<\/a>: \u201cp\/q2-q4!\u201d (not including the quotation marks).<\/p>\n<h2>Checkmate<\/h2>\n<p>It \u201ctook 4+ days on an AMD Radeon Vega64 running hashcat at about 930MH\/s during that time (those familiar know the hash-rate fluctuates and slows down towards the end),\u201d Williams reported. An AMD Radeon Vega64 is a graphics card and Hashcat is a password-cracking program that takes advantage of the powerful parallel-computing capabilities of graphics cards.<\/p>\n<p>A few hours after Williams\u2019 message, forum member Arthur Krewat provided the passwords for the four remaining uncracked hashes. They were:<\/p>\n<ul>\n<li>Katseff: graduat;<\/li>\n<li>Babao\u011flu: 12ucdort<\/li>\n<li>Fabry: 561cml..<\/li>\n<li>London:..pnn521<\/li>\n<\/ul>\n<p>Forum members quickly pointed out that Thompson\u2019s password \u201cp\/q2-q4!\u201d is the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Descriptive_notation\">descriptive notation<\/a> for a <a href=\"https:\/\/en.wikibooks.org\/wiki\/Chess_Opening_Theory\/1._d4\">common opening move<\/a> in the game of Chess.<\/p>\n<p>\u201cIf I remember right,\u201d another forum member chimed in, \u201cthe first half of this password was on a t-shirt commemorating Belle&#8217;s first half-move, although its notation may have been different.\u201d <a href=\"https:\/\/en.wikipedia.org\/wiki\/Belle_(chess_machine)\">Belle<\/a> was the name of the Chess machine developed by Thompson and Joseph Henry &#8216;Joe&#8217; Condon. Rob Pike\u2014the forum member who worked on Unix projects while at Bell Labs\u2014then moved on to a different topic not yet brought up in the discussion:<\/p>\n<blockquote>\n<p>Interesting though it is, though, I find this hacking distasteful. It was distasteful back when, and it still is. The attitudes around hackery have changed; the position nowadays seems to be that the bad guys are doing it so the good guys should be rewarded for doing it first. That&#8217;s disingenuous at best, and dangerous at worst.<\/p>\n<\/blockquote>\n<p> It\u2019s an interesting thought and raises a good point about the ethics of dredging up the passwords of real people. Ultimately, however, I find myself leaning in favor of studying password cracking. Over the past decade, <a href=\"https:\/\/arstechnica.com\/information-technology\/2013\/01\/grammar-badness-makes-cracking-harder-the-long-password\/\">researchers from universities<\/a> and <a href=\"https:\/\/arstechnica.com\/information-technology\/2013\/10\/how-the-bible-and-youtube-are-fueling-the-next-frontier-of-password-cracking\/\">elsewhere<\/a> have <a href=\"https:\/\/arstechnica.com\/information-technology\/2013\/10\/how-the-bible-and-youtube-are-fueling-the-next-frontier-of-password-cracking\/\">pored over cracked passwords<\/a>. The net result: we know much more now than we did a decade ago about choosing a strong password. Forum member Kurt H Maier phrased things well in a response to Pike.<\/p>\n<p>\u201cIt&#8217;s not like we&#8217;re sitting around rainbow-tabling someone&#8217;s Macbook,\u201d Maier wrote. \u201cThis stuff is, at this point, of historical interest. \u2018How many decades old must a hash be before it&#8217;s acceptable to decode it\u2019 is a valid question worth answering, but comparing this kind of archaeology to active attack is slightly absurd.\u201d<\/p>\n<p>Just the same, here\u2019s hoping Eric Schmidt and company have changed those vintage passwords.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30572\/Forum-Cracks-The-Vintage-Passwords-Of-Ken-Thompson-And-Other-Unix-Pioneers.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29623,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[3711],"class_list":["post-29622","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinepassword"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Forum Cracks The Vintage Passwords Of Ken Thompson And Other Unix Pioneers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Forum Cracks The Vintage Passwords Of Ken Thompson And Other Unix Pioneers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-10T14:36:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Forum Cracks The Vintage Passwords Of Ken Thompson And Other Unix Pioneers\",\"datePublished\":\"2019-10-10T14:36:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\\\/\"},\"wordCount\":1137,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers.jpg\",\"keywords\":[\"headline,password\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\\\/\",\"name\":\"Forum Cracks The Vintage Passwords Of Ken Thompson And Other Unix Pioneers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers.jpg\",\"datePublished\":\"2019-10-10T14:36:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,password\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinepassword\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Forum Cracks The Vintage Passwords Of Ken Thompson And Other Unix Pioneers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Forum Cracks The Vintage Passwords Of Ken Thompson And Other Unix Pioneers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/","og_locale":"en_US","og_type":"article","og_title":"Forum Cracks The Vintage Passwords Of Ken Thompson And Other Unix Pioneers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-10-10T14:36:00+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Forum Cracks The Vintage Passwords Of Ken Thompson And Other Unix Pioneers","datePublished":"2019-10-10T14:36:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/"},"wordCount":1137,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers.jpg","keywords":["headline,password"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/","url":"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/","name":"Forum Cracks The Vintage Passwords Of Ken Thompson And Other Unix Pioneers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers.jpg","datePublished":"2019-10-10T14:36:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/forum-cracks-the-vintage-passwords-of-ken-thompson-and-other-unix-pioneers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,password","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinepassword\/"},{"@type":"ListItem","position":3,"name":"Forum Cracks The Vintage Passwords Of Ken Thompson And Other Unix Pioneers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29622"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29622\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29623"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}