![]() |
Quote:
|
Quote:
HAHAHA! I bet a million dollars you don't have a fucking rainbow table and you will have to wait 2 fucking years to build one.:1orglaugh |
Quote:
I was mainly pointing that bf is not as time expensive as it used to be |
Quote:
|
ssuspect witness dont come OUTSIIIIDE...
|
Quote:
Best to use blowfish as cipher anyways ;) |
Quote:
|
Quote:
doesn't make .ht* files show. |
Quote:
|
Quote:
but yea, some are that stupid. |
Quote:
Will you stop with the random salts shit! It doesn't fucking matter. Here's the code to brute force any three letter password no matter how is was created or whatever "salt": $alphadata = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLM NOPQRSTUVWXYZ"; @one = split(//, $alphadata); @two = @one; @three = @one; $a = 0; foreach (@one) { $b=0; foreach(@two) { $c = 0; foreach (@three) { $pw = "$one[$a]$two[$b]$three[$c]"; #### HTTP REQUEST LOGIN USING $pw; #### IF RETURN CODE = 20 BAMM!!!!! I'M IN!! $c++;} $b++;} $a++;} Yeah, you can limit login tries to defeat it; but get off the random salt shit. That does fucking nothing. |
Quote:
|
Quote:
You can use any file in any directory to store passwords. You tell htaccess where the file is in the .htacces file! AuthUserFile /usr/home/Rootdirectory/8usdn2873hs772nas723a.txt Stupid name in the root directory...not accessible to the web even if not password protected. |
Quote:
avoid lookups for every file that is loaded. :2 cents: |
Quote:
I cracked a 3char encrypted password that was made with crypt(no matter the salt) in one fucking try! -------------------------------- $passencrypted = "fill_it_in"; $alphadata = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLM NOPQRSTUVWXYZ"; @one = split(//, $alphadata); @two = @one; @three = @one; $salt = substr($passencrypted, 0, 2); print "salt = $salt<br>"; $a = 0; foreach (@one) { $b=0; foreach(@two) { $c = 0; foreach (@three) { $pw = "$one[$a]$two[$b]$three[$c]"; $check = crypt($pw, $salt); if ($check eq $passencrypted) {print "$pw - is a possible password<br>"; exit;} $c++;} $b++;} $a++;} print "Ended OK"; |
Quote:
and btw its more than 1 try |
Quote:
http://www.cs.wright.edu/~pmateti/In...etc-passwd.txt Not a real password file, but google will allow you tp find stuff. |
Quote:
|
Quote:
|
Quote:
|
Quote:
|
Hmmmm... better yet...whay don't I hack your password and post under your name.
Go ahead and challege me to do it....BITCH! |
Quote:
|
Quote:
|
wats ur asn nubr
|
Quote:
|
I know I'm beating a dead horse, here... but is this like the first time you've seen crypt(), I mean, ever? DES is only significant to EIGHT bytes, and that's all that is guaranteed. Period.
Not to mention your proposed salt is either static, or the password itself. It doesn't work that way. Ya might want to look into ROT13. Now that will take any sized string, man.. and DAMN is it fast! |
Quote:
|
What I'd really like to know is why you bother with
Quote:
Quote:
Quote:
Quote:
|
Quote:
I wasn't trying to write "secret code" to baffle webmasters who don't even write scripts. How would that illustrate anything to them? BTW: It's really fucking lame to take a solution that you could never have done yourself and then spend 24 hours since it was posted trying to pick at it. why didn't you post a solution yesterday and end this thread?... Because you couldn't. Stop acting like a jealous fagot. It will not make you a better webmaster. Now I'm done. Gotta go do something more productive than listening to stupid shit. |
:1orglaugh :1orglaugh
|
All times are GMT -7. The time now is 07:12 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123