![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#51 | |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
This problem only concerns the crypt function, using another form of encryption is a differrent story. I brought this up because plenty of programs do use the crypt method to put passwords in to htpasswd file and they should switch to a direct htaccess creation like you. I assume your site is working, I didn't get to try it. Anyway enough of this I got other stuff to do. But it was interesting for me to actually see how bad crypt() could be with a bad password. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#52 | |
Totally Borked
Industry Role:
Join Date: Feb 2005
Posts: 6,284
|
Quote:
Yes, the 8-chra limit for some OSs has been shown, but so fucking what? First you started out saying the salt added to the passwd, which was shot down sinc enoone uses standard salt. Then you said noone understands. Then you asked for a proof-of-concept 3char passwd to crack. Then you said you've had enough and you're off to bed????? Ehm, ![]() Thankfully, nobody hires you to programme for them.
__________________
![]() For coding work - hit me up on andy // borkedcoder // com (consider figuring out the email as test #1) All models are wrong, but some are useful. George E.P. Box. p202 |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#53 |
Macdaddy coder
Industry Role:
Join Date: Feb 2002
Location: MacDaddy pimp coder
Posts: 2,806
|
Yep, you're on crack
![]()
__________________
MacDaddy Coder. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#54 | |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
Well, you're right! The limit is 8 chars. I only got into the salt debate because someone posted that the problem could be fixed with random salt. The only fix is to limit passwords to 8 chars or use something other than crypt() Well, at least I discovered some really smart people in this post which made it all worth my time. Thanks for all the replies and "battles" hehehe! |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#55 | |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#56 | ||
Totally Borked
Industry Role:
Join Date: Feb 2005
Posts: 6,284
|
Quote:
Nope, I still don't get you. You were the one that went on and on about the salt and how it is the first two letters of the password. Then you said your janesmith123 janesmith321 whatever encrypted passwords were all the same. Well, for me they're not. Then you said Quote:
Where the hell did you find that bullshit text to copy and paste from?
__________________
![]() For coding work - hit me up on andy // borkedcoder // com (consider figuring out the email as test #1) All models are wrong, but some are useful. George E.P. Box. p202 |
||
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#57 | |
Totally Borked
Industry Role:
Join Date: Feb 2005
Posts: 6,284
|
Quote:
The truth. Now crack it. All of 3chars. You said you'd do it in one try.
__________________
![]() For coding work - hit me up on andy // borkedcoder // com (consider figuring out the email as test #1) All models are wrong, but some are useful. George E.P. Box. p202 |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#58 |
Totally Borked
Industry Role:
Join Date: Feb 2005
Posts: 6,284
|
From Netcrafts homepage as of today
Four of the 10 most reliable hosters run their sites on FreeBSD, while two use Linux, and Windows Server 2003, Windows 2000 and Solaris 8 all make one appearance. Let me guess where you fall?
__________________
![]() For coding work - hit me up on andy // borkedcoder // com (consider figuring out the email as test #1) All models are wrong, but some are useful. George E.P. Box. p202 |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#59 | |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
If you've been around for a while you probably already bought one of my scripts...so pop that non-sense. Nobody put up a link that had a 9 digit password encrypted with crypt()! And it wasn't me who went off on a tangent about salt. The only reason I brought up salt was to show how crypt made a password. I said over and over again that salt was NOT the problem; yet you sound as though you think crypt() can be fixed by not using standard salt; and if that's what you still think then you didn't understand the problem. The fix is to use a short password less than 9 characters. Forget about salt. But anyway thanks for posting some good stuff. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#60 | |
Totally Borked
Industry Role:
Join Date: Feb 2005
Posts: 6,284
|
Nope, it was you who kept harping on about salt in your original post. Now you're changing your stance to "any 9char passwd"
Well, I aint saying anything until you crack my piss easy 3char passd. Again, just to quote you: Quote:
I'm off to bed. You have until the morning to crack it. Hopefully this thread will now die as it should do, kneejerker.
__________________
![]() For coding work - hit me up on andy // borkedcoder // com (consider figuring out the email as test #1) All models are wrong, but some are useful. George E.P. Box. p202 |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#61 |
Totally Borked
Industry Role:
Join Date: Feb 2005
Posts: 6,284
|
and I have never bought a script in my life,so I doubt it!
I programme low level code. I can back-end script with my eyes closed, so why would I need to buy shitty htaccess perl scripts from you?
__________________
![]() For coding work - hit me up on andy // borkedcoder // com (consider figuring out the email as test #1) All models are wrong, but some are useful. George E.P. Box. p202 |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#62 |
Confirmed User
Join Date: Feb 2002
Posts: 720
|
Hat's off to you. Quality post 4 sure!
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#63 |
Totally Borked
Industry Role:
Join Date: Feb 2005
Posts: 6,284
|
Well, I never said it was hard....
![]()
__________________
![]() For coding work - hit me up on andy // borkedcoder // com (consider figuring out the email as test #1) All models are wrong, but some are useful. George E.P. Box. p202 |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#64 | |
Confirmed User
Join Date: Feb 2002
Posts: 720
|
Quote:
I did it with pencil and paper ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#65 |
Confirmed User
Join Date: Nov 2002
Location: PandaLand™
Posts: 3,494
|
borked - whats your contact info - email
__________________
![]() ![]() ![]() RIP TD
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#66 | |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
Like I said; I only need one guess for a 3 char encrypted password. Go here and create passwords or use crypt($passwd, $salt). http://www.htaccesstools.com/htpasswd-generator/ Run script: #!/usr/bin/perl print "Content-type: text/html\n\n"; $alphadata = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLM NOPQRSTUVWXYZ"; @one = split(//, $alphadata); @two = @one; @three = @one; $passencrypted = "QVK7qHfRnSw3M"; $salt = substr($passencrypted, 0, 2); print "salt = $salt<br>"; $a = 0; foreach (@one) { if ($a >= 80) { print "abort<br>"; exit; } $b=0; foreach(@two) { $c = 0; foreach (@three) { $pw = "$one[$a]$two[$b]$three[$c]"; $check = crypt($pw, $salt); if ($check eq $passencrypted) { print "$pw - is a possible password<br>"; } $c++; } $b++; } $a++; } print "Ended OK"; exit; ![]() ![]() ![]() So much for encryption! |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#67 |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
PS: That little hack I just wrote for you assumes passwords without special characters...I could easily add all special charaters to the alphadata string.
And, I could do the full eight charaters but not on MY SERVER! Too much resources. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#68 |
Confirmed User
Join Date: Feb 2002
Posts: 720
|
Wow, you code like you draw dude!
![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#69 |
Confirmed User
Join Date: Sep 2001
Location: Boston
Posts: 4,873
|
I didn't really go into it but I think I get what you are saying - basically people are using the password as salt and they should use a random salt?
generally i think people are a bit stupid about security in this industry |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#70 | |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
![]() ![]() ![]() BRUUUUUUUUUUHAHAHAHAHAHAHAHAHAHAHAHAHA!! HAHHAHAHAHAHAHAHAH!!! *sigh* Theres no know way...hehehehe! Unless you can write 20 lines of FUCKING CODE!!! BRUUUUUUUUUUHAHAHAHAHAHHAHAHAHAHA! Lets see; please count these lines: $alphadata = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLM NOPQRSTUVWXYZ"; @one = split(//, $alphadata); @two = @one; @three = @one; $passencrypted = "QVK7qHfRnSw3M"; $salt = substr($passencrypted, 0, 2); print "salt = $salt<br>"; $a = 0; foreach (@one) { $b=0; foreach(@two) { $c = 0; foreach (@three) { $pw = "$one[$a]$two[$b]$three[$c]"; $check = crypt($pw, $salt); if ($check eq $passencrypted) {print "$pw - is a possible password<br>";} $c++;} $b++;} $a++;} print "Ended OK"; hehehehehe....hohohohoh....HAHAHAHAHAHAHA! *sigh* |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#71 |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Where my dogs at?
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#72 |
Confirmed User
Join Date: Feb 2002
Location: Amsterdam
Posts: 9,377
|
perl is sooooo 80's
![]()
__________________
| http://www.sinnerscash.com/ | ICQ: 370820 | Skype: SinnersCash | AdultWhosWho | |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#73 |
Confirmed User
Join Date: Jun 2005
Location: Irvine, CA
Posts: 2,442
|
this thread makes me giggle.
![]()
__________________
254342256
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#74 | |
Confirmed User
Join Date: Oct 2005
Location: Charlotte, NC
Posts: 908
|
Quote:
__________________
ICQ: 284903372 |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#75 |
Confirmed User
Industry Role:
Join Date: Oct 2002
Location: lalaland
Posts: 2,120
|
Or use a salt like: $1$<8 random chars>
Then you'll get an MD5 encrypted password, which is much better than crypt. Don't ever use the password as the salt value, it has to be random chars. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#76 | |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
No matter how much "new" shit comes out I have yet to find something that could not be done in perl already. ASP = SSI with perl cgi Java = Object oriented perl (Java does come with easy tools though) PHP = If you can't learn perl C, C++ = Perl without the cool shit for text munipulation ...etc... I think the reason webmasters sought solutions other than perl is that they didn't have good knowlege of libwww libwww contains tons of modules that allow perl to do, well, MAGIC! Any new thing done on the internet can be programed into a perl module and added to libwww. The modules can be written in differrent languages also, with C++ being one of the most used. Libwww allows perl to grow as a language without actually changing perl. This is not true with most of the "new stuff". If development of libwww continues in a positive direction then I suspect that in the future webmasters will migrate back to it as they will find that they can learn 5 new languages to get the project done or they can just use perl with all it's libraries. The only draw back I see for perl is client-side applications. The client has to make an http request for perl. But Javascript can handle a lot of that and SSI can use perl to deterime what javascript to send the client. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#77 | |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#78 | |
Confirmed User
Join Date: Feb 2002
Posts: 720
|
Quote:
That's not 'unecrypting', that's cracking. If someone can read your crypted passwords, you have bigger problems than an 8 character limit. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#80 | |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
All your server admins for your hosted sites can read your surfers encrypted passwords. When one of the above gets fired and decides to fuck up all you member/customer accounts, you will then understand why I brought this issue up. That's the only reason they are encrypted. The hackers and surfers have to "break in" to read these files so like you said, if they can read the files you have bigger problems. But that's not the issue. The issue is that there is a beliefe that the crypt files can not be used to return the original password. I have shown this to be a myth. PS: "unencrypting" is a subset of "cracking". ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#81 | |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
darksoul-logic = "Don't tell me about cigarettes causing cancer; that was discovered years ago...(begins to chain smoke)". |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#82 | |
Confirmed User
Join Date: Apr 2002
Location: /root/
Posts: 4,997
|
Quote:
I'm already aware of the issue so I don't need to hear your preaching about. See my point ? Everyone knows about it, move along. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#83 |
Confirmed User
Join Date: May 2005
Posts: 2,737
|
Jesus christ what fucking shitstorm did i walk into.
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#84 | |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
BTW: There is no such thing as a encrytped password created by a known/accesible function that cannot be unencrypted! There are only passwords that require too much processing to be worth anyone's time(except russians spys). For example the 8char password could take up to 6,095,689,385,410,816 iterations of a subroutine to unencrypt. And that would requires a dedicated computer that could run for anywhere to 2 months to 2 years before giving the result. Thus the requirement of many secure sites that you change your password every 90 days. By the time the computer has figured out your encrytped password you have already changed it to something else. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#85 | |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#86 | |
Confirmed User
Join Date: Apr 2002
Location: /root/
Posts: 4,997
|
Quote:
http://www.antsight.com/zsl/rainbowcrack/ you can STFU now |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#87 | |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
I said "up to" as in, the worst case scenario would require that much processing. You must be one of those dudes who reads the want ad saying "earn up to $50,000" and you're stupid enough to think that's what YOU will make. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#88 | ||
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
You should read the shit you post before posting it Quote:
Everything's faster when it's already done before you fucking start. |
||
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#89 | ||
Confirmed User
Join Date: Apr 2002
Location: /root/
Posts: 4,997
|
Quote:
Quote:
|
||
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#90 |
Totally Borked
Industry Role:
Join Date: Feb 2005
Posts: 6,284
|
Here we go again
![]() The easy crack of DES is all assuming you have access to the encrypted password file to compare. If you don't, then you have to hope to god the site to hack doesn't enforce some limit on the number of tries. And then after your 65 billion guesses, you get in. To where, an adult pay site to see some booteeee. ![]() May have been easier to just pay the 1-month fee. How many sites use htaccess to give free run of the server?
__________________
![]() For coding work - hit me up on andy // borkedcoder // com (consider figuring out the email as test #1) All models are wrong, but some are useful. George E.P. Box. p202 |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#91 | |
Confirmed User
Join Date: Apr 2002
Location: /root/
Posts: 4,997
|
Quote:
haha, so you finnaly read what a rainbow table is ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#92 | |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#93 | |
Confirmed User
Join Date: Apr 2002
Location: /root/
Posts: 4,997
|
Quote:
you said between 2 months and 2 years using rainbow tables with take a few minutes and nowhere near 2 months. make up your mind |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#94 | |
Totally Borked
Industry Role:
Join Date: Feb 2005
Posts: 6,284
|
Quote:
![]()
__________________
![]() For coding work - hit me up on andy // borkedcoder // com (consider figuring out the email as test #1) All models are wrong, but some are useful. George E.P. Box. p202 |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#96 | |
Confirmed User
Join Date: May 2006
Posts: 1,910
|
Quote:
I had said that a 3char encrypted (using crypt() )password was bad and could be cracked in no time by someone who saw the encrypted password(like a employee of the site). That's all I said. The you go off into space and make a big deal about it. Did you run the last fucking code I posted? Go ahead and try your 3char encryption in my code and it will undo that shit in less than 3 secs! |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#97 |
Confirmed User
Join Date: May 2005
Posts: 2,737
|
y'all need to find jesus.
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#98 | |
Totally Borked
Industry Role:
Join Date: Feb 2005
Posts: 6,284
|
Quote:
__________________
![]() For coding work - hit me up on andy // borkedcoder // com (consider figuring out the email as test #1) All models are wrong, but some are useful. George E.P. Box. p202 |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#99 | |
Confirmed User
Join Date: Apr 2002
Location: /root/
Posts: 4,997
|
Quote:
thats the reason this thread is useless ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#100 |
Totally Borked
Industry Role:
Join Date: Feb 2005
Posts: 6,284
|
anyway, I said random salts.
rainbow tables are lookup tables. No good if the salt is random - the encrypted pass will change each time
__________________
![]() For coding work - hit me up on andy // borkedcoder // com (consider figuring out the email as test #1) All models are wrong, but some are useful. George E.P. Box. p202 |
![]() |
![]() ![]() ![]() ![]() ![]() |