Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Errant

Idiots,

Passwords are not stored in a modern system. A one way cryptographic hash is stored instead. In reality, passwords are not checked directly. They are run through a complex hashing program that CAN NOT BE REVERSED and the output of the hash is stored.

To verify a password, the submitted password is put through the same hash and the output is compared to the stored hash. If they match then the proper password has been submitted.


8 posted on 07/25/2013 3:56:36 PM PDT by taxcontrol
[ Post Reply | Private Reply | To 1 | View Replies ]


To: taxcontrol

If any company is storing passwords in the open or even in encrypted form, they are going to get sued for doing this. We store customer passwords as one-way hashes exactly so these types of requests can never be complied with.


15 posted on 07/25/2013 4:02:05 PM PDT by vbmoneyspender
[ Post Reply | Private Reply | To 8 | View Replies ]

To: taxcontrol

Send the Obama morons the cryptographic hash data and let them spend the next several years trying to reverse them. Nitwits.


48 posted on 07/25/2013 5:01:12 PM PDT by COBOL2Java (I'm a Christian, pro-life, pro-gun, Reaganite. The GOP hates me. Why should I vote for them?)
[ Post Reply | Private Reply | To 8 | View Replies ]

To: taxcontrol
I see that you haven't been introduced to rainbow tables. The typical hash used is md5. If you can get the shadow password file off a Linux system, you then take the md5 associated with the user you want (usually root) and run that through the rainbow table. It will hand you an ascii string that produces the md5 sum. The advent of cloud computing means there are many rainbow table servers sitting on the web to provide the lookup service.

If you want to know more details about system security, sign up for SANS classes. They are worth the time and money.

79 posted on 07/25/2013 5:46:05 PM PDT by Myrddin
[ Post Reply | Private Reply | To 8 | View Replies ]

To: taxcontrol

unless those companies have been doing a man in the middle attack to obtain passwords as needed

and yes, i would expect they would dnload kiddie porn onto a targets machine in order to implicate him


101 posted on 07/25/2013 6:40:43 PM PDT by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 8 | View Replies ]

To: taxcontrol
To verify a password, the submitted password is put through the same hash and the output is compared to the stored hash. If they match then the proper password has been submitted.

For those of us who are somewhat knowledgeable, but not hackers, can you give us a real world made-up example so it can more easily be grasped?

136 posted on 07/25/2013 8:00:20 PM PDT by publius911 (Look for the Union label, then buy something else.)
[ Post Reply | Private Reply | To 8 | View Replies ]

To: taxcontrol

On the other hand, if they turn over the stored hash, then conceivably if they require the web companies to change how they respond to password requests, then they don’t need the password.


157 posted on 07/25/2013 10:06:41 PM PDT by vbmoneyspender
[ Post Reply | Private Reply | To 8 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson