Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security The Internet

New Online MD5 Hash Database 295

Gravix writes with a shameless plug for his new site "Sporting over 12 million entries, project GDataOnline is one of the largest non-RainbowTable based MD5 crackers on the internet. The database spans over 7 languages, 35 topics, and contains common mutations to words that include numbers and capitalization. Average crack time for 5 hashes: .04 seconds. No more waiting weeks for your results!" Shameless plug aside, the site still seems worth a closer look.
This discussion has been archived. No new comments can be posted.

New Online MD5 Hash Database

Comments Filter:
  • Hmmm... (Score:5, Insightful)

    by mg2 ( 823681 ) on Monday August 22, 2005 @12:49AM (#13369690)
    Seems like using salted MD5 hashes would render this kind of stuff totally useless.

    ...You all use salted md5 hashing in your applications, don't you?

  • by VeryProfessional ( 805174 ) on Monday August 22, 2005 @12:52AM (#13369702)
    Apart from the fact that this site is somewhat morally questionable, it doesn't seem to work very well. I inserted a number of hashes for common first names and dictionary words, and none of them returned a hit. If the database doesn't even cover common stuff such as this, what is it really good for? Really, 12 million hashes out of a space of 2^128 is truly miniscule.
  • by kasperd ( 592156 ) on Monday August 22, 2005 @01:02AM (#13369729) Homepage Journal
    I inserted a number of hashes for common first names and dictionary words, and none of them returned a hit.

    You wouldn't by any chance be using the md5sum command line utility and typing a newline after the word? I just tried my own name, which turned out to be in the database. Could you give just a few examples of the hash values you submitted, and the word you expected it to return?
  • wow (Score:1, Insightful)

    by Anonymous Coward on Monday August 22, 2005 @01:07AM (#13369740)
    They must be smoking some dope ass crack if they think they have lots of common permutations of dictionary words covered. Try fcaf8cb5751b2995c95f6c8021584eff (h3ll0) or 50c20343d45744b1aa36ace8c04c700a (th3r3). Is there anything simpler in terms of commons words with obvious numeric substitutions that it actually gets?
  • by aicrules ( 819392 ) on Monday August 22, 2005 @01:36AM (#13369817)
    GREAT! So now all freaking IT security departments are going to up the minimum password length to like 64 in ADDITION to having to change it every other day, not being able to use the last 1000 passwords you've ever used, and requiring alternating caps, numbers, and punctuation.

    Sure, I'm exaggerating a little, but the amount of time I have to spend on password maintenance is nearly making a line item on my time sheet.
  • Pointless. (Score:3, Insightful)

    by Randseed ( 132501 ) on Monday August 22, 2005 @01:38AM (#13369827)
    I generated a PHP script that does password managing a couple of weeks ago, and even I used a SALT in the process. I suppose that this is useful if you come across a site so horribly broken as to not use a SALT, or if you know the SALT ahead of time somehow. (Not hard to do the latter, really.)

    All in all, this is another ho-hum kind of story.

  • by bobbozzo ( 622815 ) on Monday August 22, 2005 @01:44AM (#13369843)
    One of the vendors at DefCon this year was selling them.

    Try googling for Rainbow Tables.
  • Re:oh, i get it! (Score:2, Insightful)

    by isorox ( 205688 ) on Monday August 22, 2005 @02:13AM (#13369906) Homepage Journal
    8acb583ce572bbdd4d8cd3375fba65f9
  • Re:Linux (Score:5, Insightful)

    by rhizome ( 115711 ) on Monday August 22, 2005 @05:48AM (#13370374) Homepage Journal
    More often then not people are dumb and easily scared. Every time you do something they don't expect you to do, they might treat you as a criminal, no matter what your intentions.

    This is why it's not a good idea to humiliate people who have more power than you if you have something to lose.

  • by pAnkRat ( 639452 ) on Monday August 22, 2005 @06:21AM (#13370450)
    Just out of interrest, why would you store the password for a user as (pseudo code follows)

    md5(pw);

    and not

    md5(username + pw);

    Salting the the hash with a variable (here: username) helps preventing wide scale probing with rainbow lists in the event the DB gets "stolen".

  • Re:Linux (Score:4, Insightful)

    by indifferent children ( 842621 ) on Monday August 22, 2005 @07:50AM (#13370615)
    Booting the machine in Knoppix requires that the 'bad guy' have physical access to the machine. Even if physical access cannot be well restricted, you can turn-off 'boot from CDROM' in the bios, and password-protect the bios. Now the 'bad guy' has to open the machine, find the motherboard-type, find out which jumper clears the bios password(s), etc. Most machines can also be padlocked shut, so now the 'bad guy' needs to bring a Dremel or such.

Old programmers never die, they just hit account block limit.

Working...