![]() |
Quote:
darksoul-logic = "Don't tell me about cigarettes causing cancer; that was discovered years ago...(begins to chain smoke)". |
Quote:
I'm already aware of the issue so I don't need to hear your preaching about. See my point ? Everyone knows about it, move along. |
Jesus christ what fucking shitstorm did i walk into.
|
Quote:
BTW: There is no such thing as a encrytped password created by a known/accesible function that cannot be unencrypted! There are only passwords that require too much processing to be worth anyone's time(except russians spys). For example the 8char password could take up to 6,095,689,385,410,816 iterations of a subroutine to unencrypt. And that would requires a dedicated computer that could run for anywhere to 2 months to 2 years before giving the result. Thus the requirement of many secure sites that you change your password every 90 days. By the time the computer has figured out your encrytped password you have already changed it to something else. |
Quote:
|
Quote:
http://www.antsight.com/zsl/rainbowcrack/ you can STFU now |
Quote:
I said "up to" as in, the worst case scenario would require that much processing. You must be one of those dudes who reads the want ad saying "earn up to $50,000" and you're stupid enough to think that's what YOU will make. |
Quote:
You should read the shit you post before posting it Quote:
Everything's faster when it's already done before you fucking start. |
Quote:
Quote:
|
Here we go again:boid
The easy crack of DES is all assuming you have access to the encrypted password file to compare. If you don't, then you have to hope to god the site to hack doesn't enforce some limit on the number of tries. And then after your 65 billion guesses, you get in. To where, an adult pay site to see some booteeee. :helpme May have been easier to just pay the 1-month fee. How many sites use htaccess to give free run of the server? |
Quote:
haha, so you finnaly read what a rainbow table is :) |
Quote:
|
Quote:
you said between 2 months and 2 years using rainbow tables with take a few minutes and nowhere near 2 months. make up your mind |
Quote:
|
Quote:
|
Quote:
I had said that a 3char encrypted (using crypt() )password was bad and could be cracked in no time by someone who saw the encrypted password(like a employee of the site). That's all I said. The you go off into space and make a big deal about it. Did you run the last fucking code I posted? Go ahead and try your 3char encryption in my code and it will undo that shit in less than 3 secs! |
y'all need to find jesus.
|
Quote:
|
Quote:
thats the reason this thread is useless :) |
anyway, I said random salts.
rainbow tables are lookup tables. No good if the salt is random - the encrypted pass will change each time |
Quote:
|
Quote:
HAHAHA! I bet a million dollars you don't have a fucking rainbow table and you will have to wait 2 fucking years to build one.:1orglaugh |
Quote:
I was mainly pointing that bf is not as time expensive as it used to be |
Quote:
|
ssuspect witness dont come OUTSIIIIDE...
|
Quote:
Best to use blowfish as cipher anyways ;) |
Quote:
|
Quote:
doesn't make .ht* files show. |
Quote:
|
Quote:
but yea, some are that stupid. |
Quote:
Will you stop with the random salts shit! It doesn't fucking matter. Here's the code to brute force any three letter password no matter how is was created or whatever "salt": $alphadata = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLM NOPQRSTUVWXYZ"; @one = split(//, $alphadata); @two = @one; @three = @one; $a = 0; foreach (@one) { $b=0; foreach(@two) { $c = 0; foreach (@three) { $pw = "$one[$a]$two[$b]$three[$c]"; #### HTTP REQUEST LOGIN USING $pw; #### IF RETURN CODE = 20 BAMM!!!!! I'M IN!! $c++;} $b++;} $a++;} Yeah, you can limit login tries to defeat it; but get off the random salt shit. That does fucking nothing. |
Quote:
|
Quote:
You can use any file in any directory to store passwords. You tell htaccess where the file is in the .htacces file! AuthUserFile /usr/home/Rootdirectory/8usdn2873hs772nas723a.txt Stupid name in the root directory...not accessible to the web even if not password protected. |
Quote:
avoid lookups for every file that is loaded. :2 cents: |
Quote:
I cracked a 3char encrypted password that was made with crypt(no matter the salt) in one fucking try! -------------------------------- $passencrypted = "fill_it_in"; $alphadata = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLM NOPQRSTUVWXYZ"; @one = split(//, $alphadata); @two = @one; @three = @one; $salt = substr($passencrypted, 0, 2); print "salt = $salt<br>"; $a = 0; foreach (@one) { $b=0; foreach(@two) { $c = 0; foreach (@three) { $pw = "$one[$a]$two[$b]$three[$c]"; $check = crypt($pw, $salt); if ($check eq $passencrypted) {print "$pw - is a possible password<br>"; exit;} $c++;} $b++;} $a++;} print "Ended OK"; |
Quote:
and btw its more than 1 try |
Quote:
http://www.cs.wright.edu/~pmateti/In...etc-passwd.txt Not a real password file, but google will allow you tp find stuff. |
Quote:
|
Quote:
|
Quote:
|
All times are GMT -7. The time now is 09:37 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123