|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 88
Members: 0
Total: 88
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Hash Bruteforcing History |
|
Posted: Wed Oct 29, 2008 4:38 pm |
|
|
InsidePro |
Active user |
|
|
Joined: Sep 13, 2008 |
Posts: 28 |
|
|
|
|
|
|
|
Let’s get the picture, what happens when a user publishes a hash, password to which is to be recovered, on the forum (to be more specific, let that be an MD5 hash “0040626ebe4c11e2f79fc581e0c9af66”)? Precisely – all who have free time and the desire engage in the recovery using different attacks, and it’s obvious that many of them do the same job, trying to recover the hash password with same attacks and same settings.
It would be great if the password could be easily recovered with a hybrid or combined attack; but what if none of the attacks worked out? The only option that remains is brute-force attack, which, despite that it’s most time-consuming, guarantees the complete recovery of the password, provided that the attack settings – character set and length of passwords to be validated – fit right.
...
>> http://forum.insidepro.com/viewtopic.php?t=2283 |
|
|
|
|
|
|
|
|
Posted: Thu Oct 30, 2008 8:23 am |
|
|
pexli |
Valuable expert |
|
|
Joined: May 24, 2007 |
Posts: 665 |
Location: Bulgaria |
|
|
|
|
|
|
Неплохая идея |
|
|
|
|
www.waraxe.us Forum Index -> Hash related information
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB 2001-2008 phpBB Group
|
|
|
|
|
|
|