GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   You got hacked!!! Heres the reason why...password encryption!! (https://gfy.com/showthread.php?t=649628)

interracialtoons 08-30-2006 09:19 AM

Quote:

Originally Posted by darksoul
whats this thread about ?
8chr crypt passwords had been crackable since ages

Yeah, and that's why this post is relevant because people keep fucking using them!


darksoul-logic = "Don't tell me about cigarettes causing cancer; that was discovered years ago...(begins to chain smoke)".

darksoul 08-30-2006 09:27 AM

Quote:

Originally Posted by interracialtoons
darksoul-logic = "Don't tell me about cigarettes causing cancer; that was discovered years ago...(begins to chain smoke)".

you damn right.
I'm already aware of the issue so I don't need to hear your preaching about.

See my point ? Everyone knows about it, move along.

mrkris 08-30-2006 09:30 AM

Jesus christ what fucking shitstorm did i walk into.

interracialtoons 08-30-2006 09:39 AM

Quote:

Originally Posted by darksoul
you damn right.
I'm already aware of the issue so I don't need to hear your preaching about.

See my point ? Everyone knows about it, move along.

Oh, you could here me typing this thread and had to come here to tell me to keep it down so you could concentrate.


BTW: There is no such thing as a encrytped password created by a known/accesible function that cannot be unencrypted!
There are only passwords that require too much processing to be worth anyone's time(except russians spys).

For example the 8char password could take up to 6,095,689,385,410,816 iterations of a subroutine to unencrypt. And that would requires a dedicated computer that could run for anywhere to 2 months to 2 years before giving the result. Thus the requirement of many secure sites that you change your password every 90 days. By the time the computer has figured out your encrytped password you have already changed it to something else.

interracialtoons 08-30-2006 09:43 AM

Quote:

Originally Posted by mrkris
Jesus christ what fucking shitstorm did i walk into.

:1orglaugh

darksoul 08-30-2006 09:49 AM

Quote:

Originally Posted by interracialtoons
For example the 8char password could take up to 6,095,689,385,410,816 iterations of a subroutine to unencrypt. And that would requires a dedicated computer that could run for anywhere to 2 months to 2 years

shows how much you know.
http://www.antsight.com/zsl/rainbowcrack/

you can STFU now

interracialtoons 08-30-2006 09:56 AM

Quote:

Originally Posted by darksoul
shows how much you know.
http://www.antsight.com/zsl/rainbowcrack/

you can STFU now

Show how good you can read!

I said "up to" as in, the worst case scenario would require that much processing.

You must be one of those dudes who reads the want ad saying "earn up to $50,000" and you're stupid enough to think that's what YOU will make.

interracialtoons 08-30-2006 10:03 AM

Quote:

Originally Posted by darksoul
shows how much you know.
http://www.antsight.com/zsl/rainbowcrack/

you can STFU now


You should read the shit you post before posting it

Quote:

Originally Posted by antsight.com
time-memory trade-off cracker can be hundreds of times faster than a brute force cracker, with the help of precomputed tables.

It's faster only after doing all the shit I said in advance and storing the results. What a waste of fucking time for you to post such obvious bullshit.
Everything's faster when it's already done before you fucking start.

darksoul 08-30-2006 10:04 AM

Quote:

Originally Posted by interracialtoons
Show how good you can read!

I said "up to" as in, the worst case scenario would require that much processing.

You must be one of those dudes who reads the want ad saying "earn up to $50,000" and you're stupid enough to think that's what YOU will make.

dude, shut the fuck up. You were talking about bruteforce
Quote:

For example the 8char password could take up to 6,095,689,385,410,816 iterations of a subroutine to unencrypt.
how much lower do you want to go ?

borked 08-30-2006 10:04 AM

Here we go again:boid

The easy crack of DES is all assuming you have access to the encrypted password file to compare. If you don't, then you have to hope to god the site to hack doesn't enforce some limit on the number of tries.

And then after your 65 billion guesses, you get in. To where, an adult pay site to see some booteeee. :helpme
May have been easier to just pay the 1-month fee.


How many sites use htaccess to give free run of the server?

darksoul 08-30-2006 10:05 AM

Quote:

Originally Posted by interracialtoons
It's faster only after doing all the shit I said in advance and storing the results. What a waste of fucking time for you to post such obvious bullshit.
Everything's faster when it's already done before you fucking start.


haha, so you finnaly read what a rainbow table is :)

interracialtoons 08-30-2006 10:07 AM

Quote:

Originally Posted by antsight.com
If you are going to generate a set of tables, make sure to calculate the key space before you start. For example, tables with keyspace 7555858447479 (69^1 + 69^2 + 69^3 + 69^4 + 69^5 + 69^6 + 69^7) needs several years to generate on single PC.

I mean really. Posting shit that says the exact shit I just posted. WTF!

darksoul 08-30-2006 10:09 AM

Quote:

Originally Posted by interracialtoons

I said "up to"

if you read what you wrote (lol)
you said between 2 months and 2 years
using rainbow tables with take a few minutes and nowhere near 2 months.
make up your mind

borked 08-30-2006 10:10 AM

Quote:

Originally Posted by darksoul
haha, so you finnaly read what a rainbow table is :)

but they don't work with random salts:winkwink:

darksoul 08-30-2006 10:12 AM

Quote:

Originally Posted by borked
but they don't work with random salts:winkwink:

but you already have the salt.

interracialtoons 08-30-2006 10:13 AM

Quote:

Originally Posted by borked
Here we go again:boid

The easy crack of DES is all assuming you have access to the encrypted password file to compare. If you don't, then you have to hope to god the site to hack doesn't enforce some limit on the number of tries.

And then after your 65 billion guesses, you get in. To where, an adult pay site to see some booteeee. :helpme
May have been easier to just pay the 1-month fee.


How many sites use htaccess to give free run of the server?

Ahhhhh! Put a sock in it!

I had said that a 3char encrypted (using crypt() )password was bad and could be cracked in no time by someone who saw the encrypted password(like a employee of the site).

That's all I said. The you go off into space and make a big deal about it.

Did you run the last fucking code I posted?

Go ahead and try your 3char encryption in my code and it will undo that shit in less than 3 secs!

mrkris 08-30-2006 10:13 AM

y'all need to find jesus.

borked 08-30-2006 10:14 AM

Quote:

Originally Posted by darksoul
but you already have the salt.

if you have access to the encrypted passwd file, yeah. but then wouldn't the server be already hacked?

darksoul 08-30-2006 10:16 AM

Quote:

Originally Posted by borked
if you have access to the encrypted passwd file, yeah. but then wouldn't the server be already hacked?


thats the reason this thread is useless :)

borked 08-30-2006 10:17 AM

anyway, I said random salts.
rainbow tables are lookup tables. No good if the salt is random - the encrypted pass will change each time

borked 08-30-2006 10:18 AM

Quote:

Originally Posted by interracialtoons
Ahhhhh! Put a sock in it!

I had said that a 3char encrypted (using crypt() )password was bad and could be cracked in no time by someone who saw the encrypted password(like a employee of the site).

That's all I said. The you go off into space and make a big deal about it.

Did you run the last fucking code I posted?

Go ahead and try your 3char encryption in my code and it will undo that shit in less than 3 secs!

what you actulaly said was that a 6char passwd was better than an 8char passwd:error

interracialtoons 08-30-2006 10:19 AM

Quote:

Originally Posted by darksoul
haha, so you finnaly read what a rainbow table is :)


HAHAHA! I bet a million dollars you don't have a fucking rainbow table and you will have to wait 2 fucking years to build one.:1orglaugh

darksoul 08-30-2006 10:21 AM

Quote:

Originally Posted by borked
anyway, I said random salts.
rainbow tables are lookup tables. No good if the salt is random - the encrypted pass will change each time

sure, but there are better ways to crack DES
I was mainly pointing that bf is not as time expensive as it used to be

darksoul 08-30-2006 10:22 AM

Quote:

Originally Posted by interracialtoons
HAHAHA! I bet a million dollars you don't have a fucking rainbow table and you will have to wait 2 fucking years to build one.:1orglaugh

lets see the money

MaddCaz 08-30-2006 10:23 AM

ssuspect witness dont come OUTSIIIIDE...

borked 08-30-2006 10:23 AM

Quote:

Originally Posted by darksoul
sure, but there are better ways to crack DES
I was mainly pointing that bf is not as time expensive as it used to be

no, i do agree. But like all, there are limitations.
Best to use blowfish as cipher anyways ;)

ServerGenius 08-30-2006 10:23 AM

Quote:

Originally Posted by borked
if you have access to the encrypted passwd file, yeah. but then wouldn't the server be already hacked?

You'd be suprised how many people store password files in web accessible folders and have Options +Indexes in their httpd.conf

darksoul 08-30-2006 10:26 AM

Quote:

Originally Posted by ServerGenius
You'd be suprised how many people store password files in web accessible folders and have Options +Indexes in their httpd.conf

Options +Indexes
doesn't make .ht* files show.

ServerGenius 08-30-2006 10:29 AM

Quote:

Originally Posted by darksoul
Options +Indexes
doesn't make .ht* files show.

no but people who have this their password file is called htpasswd :winkwink:

darksoul 08-30-2006 10:32 AM

Quote:

Originally Posted by ServerGenius
no but people who have this their password file is called htpasswd :winkwink:

the standard is .htpasswd tho which is the most used.
but yea, some are that stupid.

interracialtoons 08-30-2006 10:39 AM

Quote:

Originally Posted by borked
anyway, I said random salts.
rainbow tables are lookup tables. No good if the salt is random - the encrypted pass will change each time


Will you stop with the random salts shit! It doesn't fucking matter.


Here's the code to brute force any three letter password no matter how is was created or whatever "salt":



$alphadata = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLM NOPQRSTUVWXYZ";
@one = split(//, $alphadata);
@two = @one;
@three = @one;
$a = 0;
foreach (@one) {
$b=0;
foreach(@two) {
$c = 0;
foreach (@three) {
$pw = "$one[$a]$two[$b]$three[$c]";
#### HTTP REQUEST LOGIN USING $pw;
#### IF RETURN CODE = 20 BAMM!!!!! I'M IN!!
$c++;}
$b++;}

$a++;}



Yeah, you can limit login tries to defeat it; but get off the random salt shit. That does fucking nothing.

borked 08-30-2006 10:41 AM

Quote:

Originally Posted by interracialtoons
Will you stop with the random salts shit! It doesn't fucking matter.


Here's the code to brute force any three letter password no matter how is was created or whatever "salt":



$alphadata = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLM NOPQRSTUVWXYZ";
@one = split(//, $alphadata);
@two = @one;
@three = @one;
$a = 0;
foreach (@one) {
$b=0;
foreach(@two) {
$c = 0;
foreach (@three) {
$pw = "$one[$a]$two[$b]$three[$c]";
#### HTTP REQUEST LOGIN USING $pw;
#### IF RETURN CODE = 20 BAMM!!!!! I'M IN!!
$c++;}
$b++;}

$a++;}



Yeah, you can limit login tries to defeat it; but get off the random salt shit. That does fucking nothing.

Will you shut the fuck up and read the context of my post?

interracialtoons 08-30-2006 10:46 AM

Quote:

Originally Posted by ServerGenius
no but people who have this their password file is called htpasswd :winkwink:

Yeah, but if you're smart like me you don't even use .htpassword.
You can use any file in any directory to store passwords.

You tell htaccess where the file is in the .htacces file!

AuthUserFile /usr/home/Rootdirectory/8usdn2873hs772nas723a.txt

Stupid name in the root directory...not accessible to the web even if not password protected.

ServerGenius 08-30-2006 10:56 AM

Quote:

Originally Posted by interracialtoons
Yeah, but if you're smart like me you don't even use .htpassword.
You can use any file in any directory to store passwords.

You tell htaccess where the file is in the .htacces file!

AuthUserFile /usr/home/Rootdirectory/8usdn2873hs772nas723a.txt

Stupid name in the root directory...not accessible to the web even if not password protected.

I know I wasn't talking about me. If you're smart like me you store user accounts into a db on a seperate server over local lan and use sessions to
avoid lookups for every file that is loaded. :2 cents:

interracialtoons 08-30-2006 10:57 AM

Quote:

Originally Posted by borked
Will you shut the fuck up and read the context of my post?

I will STFU if you will admit that I did as promissed!

I cracked a 3char encrypted password that was made with crypt(no matter the salt) in one fucking try!


--------------------------------
$passencrypted = "fill_it_in";

$alphadata = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLM NOPQRSTUVWXYZ";
@one = split(//, $alphadata);
@two = @one;
@three = @one;

$salt = substr($passencrypted, 0, 2);
print "salt = $salt<br>";
$a = 0;
foreach (@one) {
$b=0;
foreach(@two) {
$c = 0;
foreach (@three) {
$pw = "$one[$a]$two[$b]$three[$c]";
$check = crypt($pw, $salt);
if ($check eq $passencrypted) {print "$pw - is a possible password<br>"; exit;}
$c++;}
$b++;}

$a++;}
print "Ended OK";

darksoul 08-30-2006 11:04 AM

Quote:

Originally Posted by interracialtoons
I will STFU if you will admit that I did as promissed!

I cracked a 3char encrypted password that was made with crypt(no matter the salt) in one fucking try!


genius!

and btw its more than 1 try

mrkris 08-30-2006 11:13 AM

Quote:

Originally Posted by borked
if you have access to the encrypted passwd file, yeah. but then wouldn't the server be already hacked?

Pulled from gooooooogle

http://www.cs.wright.edu/~pmateti/In...etc-passwd.txt

Not a real password file, but google will allow you tp find stuff.

mrkris 08-30-2006 11:18 AM

Quote:

Originally Posted by mrkris
Pulled from gooooooogle

http://www.cs.wright.edu/~pmateti/In...etc-passwd.txt

Not a real password file, but google will allow you tp find stuff.

I just realized i posted the passwd file lol

interracialtoons 08-30-2006 11:21 AM

Quote:

Originally Posted by darksoul
genius!

and btw its more than 1 try

No...it took me one try to write the script and get the result needed to login.

mrkris 08-30-2006 11:29 AM

Quote:

Originally Posted by interracialtoons
No...it took me one try to write the script and get the result needed to login.

ICQ me you cock loving thunder cunt


All times are GMT -7. The time now is 09:37 PM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123