Leak File Analyzer
What is RadioCarbon?
Typically you get leaked credentials that look like the list in the following screenshot. They consist of email addresses or user names, cleartext passwords or password hashes.
The problem with those leaked files is, that you have no idea how relevant they are and who to inform about the leak.
- They could be 15 years old and obsolete
- They typically don't indicates the origin of the leaked credentials
The idea behind RadioCarbon uses the fact that the users of the service provide indicators for the origin and the age of the leak by choosing certain passwords or email addresses.
- Users include the current year in their passwords (e.g.
- Users typically don't include a year in the password that is in the future (e.g.
- Users include the name of the website/service in their passwords (e.g.
- Users use one time email addresses for the registration (e.g.
- Users can use the "+" character to easily create new email aliases for certain purposes (e.g.
The Inner Workings
RadioCarbon uses extractions based on regular expressions, statistics and filter mechanisms to generate the report panels.
- Reads password lists from the
./passlistssub folder (used for filtering)
- Reads the leak file
words, 2 and 4 character
numbers, top level domains
tldsand one time emails
onetimemailsfrom the leak
- Processing the lists - removes standard passwords from
words, removing numbers that can't be years, prepedning
(20)for better readbility, removing
- Prints the result tables
- If the user field contains a nickname and no email address, the region analysis fails
- If the password field contains a password hash and not a clear text password, the analysis is strongly hindered
Prepare a Leak File for Analysis
If a leak file doesn't contain th clear text passwords, use john the cracker or another password cracker to pre-process the file before using it as input for RadioCarbon.