Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Timesink
This is almost completely useless as an exploit.
6 posted on 07/22/2003 8:55:12 PM PDT by general_re (The wheel is turning but the hamster is dead.)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: general_re
Or, what you said. :-)
10 posted on 07/22/2003 9:20:01 PM PDT by Ramius
[ Post Reply | Private Reply | To 6 | View Replies ]

To: general_re
I don't think it is ... if you can get the hashed version of the password you can then crack it as they don't use any "salt" in the hash. So "xyzzy" will always hash to "wqrtw" whereas in the unix world you'll throw some other characters in the password before hashing it. That salt is included as plaintext in the hash.
That means that you only have to hash all the possible combinations of 8 letter words to get their full dictionary of possibilities. If they had salt in there (say numbers 0->255) you would have to have a list that's 255 times bigger. I'm not sure what the salt number range is in unix.
Its my understanding that if you sniff the wire when login into a domain you might be able to get this hashed password.
13 posted on 07/22/2003 9:22:42 PM PDT by lelio
[ Post Reply | Private Reply | To 6 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson