sammypetter Posted January 21, 2010 Report Share Posted January 21, 2010 I'm just wondering what the members of Open Sock use for their password algorithms.Ive just been mucking about with md5's and then trying them on brute-forcing sites like data and mil-worm and found the perfect one.It has 3 bits inside an md5, a random word, number and the password which are all md5'd then that is md5'd together and it seems to not be crackable on either of them two.So I'm quite happy about it. How about yourselves? Link to comment Share on other sites More sharing options...
六兆年と一夜物語 Posted January 21, 2010 Report Share Posted January 21, 2010 Who? Link to comment Share on other sites More sharing options...
Willieh Posted January 21, 2010 Report Share Posted January 21, 2010 My password could easily be discovered by anyone with a little time on their hands. Link to comment Share on other sites More sharing options...
Kizzi Posted January 21, 2010 Report Share Posted January 21, 2010 This site isn't OpenSock. And, I speak collectively, we have no idea what you're on about. Individually I still fail to see the importance of this topic. Link to comment Share on other sites More sharing options...
Muluck Posted January 21, 2010 Report Share Posted January 21, 2010 I'm just wondering what the members of Open Sock use for their password algorithms.Ive just been mucking about with md5's and then trying them on brute-forcing sites like data and mil-worm and found the perfect one.It has 3 bits inside an md5' date=' a random word, number and the password which are all md5'd then that is md5'd together and it seems to not be crackable on either of them two.So I'm quite happy about it. How about yourselves?[/quote'] You do realize each site creates a different hash with MD5, and most likely each site that you go to will also salt their hashes.So even if you did break the new MD5 hash, you would have to figure out how they salt their hashes.If its a forum it isn't hard to figure out, which is why I suggest if the forum owner knows how to edit files to use a different salting technique. I will save you the trouble of having to google what I am talking about.A hash, is the crypted version of a password within MD5.For example:Password: TestWould be turned into something like this: Jkij89Jk9dhd9kdhhddhdEach MD5 hash is 32 characters long.Now to salt a hash, that is up to you on how you would want to salt it.Just think of salting as it being a condiment, and you "sprinkle" said salt on the hash before entering it into the database. All of this information can be found on google, and if you looked hard enough you can also find out how each forum software uses salts, even MyBB. Link to comment Share on other sites More sharing options...
Dark Posted January 22, 2010 Report Share Posted January 22, 2010 My password is darkfishy101. Uhh... you don't need a password generator. That's stupid. Link to comment Share on other sites More sharing options...
~Wright~ Posted January 22, 2010 Report Share Posted January 22, 2010 I don't know what you're talking about... I don't use a password generator. I make a ridiculously long password that I use for all of the site I go on instead. Link to comment Share on other sites More sharing options...
The Dark One Posted January 22, 2010 Report Share Posted January 22, 2010 lolwut? No point in trying to hackproof a password, to be honest. Nobody cares enough about getting into some random forum account to try, or at least go to any significant length. Link to comment Share on other sites More sharing options...
Jarl Ballin Posted January 22, 2010 Report Share Posted January 22, 2010 Let's just say, if someone figures out my password, i'm funked.... Link to comment Share on other sites More sharing options...
Niño Posted January 22, 2010 Report Share Posted January 22, 2010 My password could easily be discovered by anyone with a little time on their hands....I'll give you this weed for your password. Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.