Taggart :donor: on Nostr: This may be useful as a starting point for a word list, but remember that the ...
This may be useful as a starting point for a word list, but remember that the methodology does not and can not remove intentionally vulnerable targets. The best use of this list is likely as a starting point for your own honeypot
https://nordpass.com/most-common-passwords-list/Published at
2024-12-26 15:00:41Event JSON
{
"id": "4a7c36813cfb26f4ac827154eb5f6b658855c68645a2455eb994c531d2690a4a",
"pubkey": "220ff9f42ec1c846bf7154b09687d651eeedc18b8031428e12d374d7ee3b24c1",
"created_at": 1735225241,
"kind": 1,
"tags": [
[
"proxy",
"https://infosec.exchange/@mttaggart/113719721395799890",
"web"
],
[
"proxy",
"https://infosec.exchange/users/mttaggart/statuses/113719721395799890",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/mttaggart/statuses/113719721395799890",
"pink.momostr"
],
[
"-"
]
],
"content": "This may be useful as a starting point for a word list, but remember that the methodology does not and can not remove intentionally vulnerable targets. The best use of this list is likely as a starting point for your own honeypot \n\nhttps://nordpass.com/most-common-passwords-list/",
"sig": "ed064d60b39d850af0eb350af8ebc4b731a94717d4ddda5bc1505f19ed6a818027e9dc7c524a5f5a3ba4b504aac32b57c6d268b7b0b394b69700b177bcb4e86b"
}