Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security The Internet

New Online MD5 Hash Database 295

Gravix writes with a shameless plug for his new site "Sporting over 12 million entries, project GDataOnline is one of the largest non-RainbowTable based MD5 crackers on the internet. The database spans over 7 languages, 35 topics, and contains common mutations to words that include numbers and capitalization. Average crack time for 5 hashes: .04 seconds. No more waiting weeks for your results!" Shameless plug aside, the site still seems worth a closer look.
This discussion has been archived. No new comments can be posted.

New Online MD5 Hash Database

Comments Filter:
  • by 5n3ak3rp1mp ( 305814 ) on Monday August 22, 2005 @12:49AM (#13369688) Homepage
    Does anyone know how to get a hold of a database such as this? As part of our IT auditing I'd like to be able to do a join of our md5-encoded user passwords (no salts or anything) with this to see whose password is insecure... yeah, that's it...
  • by blowdart ( 31458 ) on Monday August 22, 2005 @01:37AM (#13369821) Homepage
    It certainly didn't get my passwords, but I was less amused by the popup attempts, for both onLoad and the getFocus event for the text box where you're supposed to type. Certainly felt slimey, no wonder the submitter was happy to try to get his own site slashdotted, the popups for casinos (well I had to see what they were!) no doubt bring in some pocket money.

    It also seems very limited to dictionary words, there's no attempt at some useful things like IP addresses (I've seen a few BBSes who don't publish IPs, but instead publish hashes).

  • Re:Linux (Score:5, Interesting)

    by isorox ( 205688 ) on Monday August 22, 2005 @02:16AM (#13369910) Homepage Journal
    Linux distros these days use MD5 by default -- but they use it in a way that's not so horribly stupid as to be broken by this attack.

    In an "intro to linux" course I had to take a while back as part of a general engineer course, I noticed that one of the test machines wasn't using /etc/shadow. A few lines of perl, /usr/share/dict and 30 seconds later and I had the root password, the same password as other more important machines. Naturally I mentioned this to the tutors (aftre some subtle brainfucking)
  • Re:Linux (Score:5, Interesting)

    by khrtt ( 701691 ) on Monday August 22, 2005 @02:31AM (#13369943)
    A friend of mine got his account terminated for a manoeuver like this -- he ran crack over an unshadowed /etc/passwd on one of the machines at his school and sent the output to the sysadmin:-)

    More often then not people are dumb and easily scared. Every time you do something they don't expect you to do, they might treat you as a criminal, no matter what your intentions. If I'd come across someone else's root password, I'd think twice before telling them. That is, unless I wasn't their boss, or hired by their boss to do this.

    BTW, I bet the root password you got was "god", "the plague", or something from the same wavelength:-).
  • by Beryllium Sphere(tm) ( 193358 ) on Monday August 22, 2005 @02:41AM (#13369968) Journal
    >You all use salted md5 hashing in your applications, don't you?

    I was just reviewing some popular browser extensions that create site-specific passwords. Click a widget, enter a keysequence or something like that and they fill in a password that's an MD5 hash of the site name concatenated with a master password from the user.

    No salt.

    There are probably blackhats out there who have *memorized* the MD5 of "passwordpaypal.com".
  • by Nailer ( 69468 ) on Monday August 22, 2005 @02:48AM (#13369980)
    it's also VERY worthwhile to read about forcing Windows to store only the NTLM hash and drop the LM hash.

    I thought NTLMv2 was MD4, which is still broken according to its inventors?
  • Re:Hmmm... (Score:4, Interesting)

    by bsdrawkcab ( 622946 ) on Monday August 22, 2005 @03:15AM (#13370046)
    You jest, but I seem to recall "pepper" being used to describe a related scheme under which the salt is secret and has a relatively small domain (but large enough to make dictionary attacks much harder). The idea was that if you provide the right password, the computer can exhaust the possible pepper values until it gets a match, but the correct value never needs to be stored.

    Sound familiar to anyone else? Anyone know if it's used in practice?
  • by Paul Crowley ( 837 ) on Monday August 22, 2005 @03:18AM (#13370056) Homepage Journal
    Actually I have seen many applications that fail to salt passwords before hashing them; it's depressing. Salt should be long enough to be globally unique when randomly generated. Old-style Unix passwords used a 12-bit salt, which was pathetic; 128 bits would be plenty.

    In addition, it's best to iterate the hash many times, which slows down dictionary attacks. See Kelsey, Schneier et al, "Secure Applications of Low-Entropy Keys":

    http://www.schneier.com/paper-low-entropy.html [schneier.com]

    The proofs in that paper are based on the assumption that the hash function is collision free, which of course MD5 isn't; another hash function might be preferable.
  • Re:quick (Score:2, Interesting)

    by qaq ( 908831 ) on Monday August 22, 2005 @03:35AM (#13370098)
    Y it's so unsecure because there is this public database of IPs availible so they won't have to try many hosts to find the one with your password.
  • by rd4tech ( 711615 ) * on Monday August 22, 2005 @03:55AM (#13370136)
    Recently I did a project for crunching out MD5 hashed on windows and linux. Linux was faster by 1/3 and mainly because of less time was spend waiting for the system to finish the i/o part.
  • by ShakiirNvar ( 904354 ) on Monday August 22, 2005 @04:03AM (#13370156) Homepage
    but as previously pointed out, with a few minor additions (as to which it depends on whether you prefer salt or pepper :p) to the procedure, this database becomes a minor security concern.
  • Interestingly... (Score:3, Interesting)

    by hajejan ( 549838 ) <(gro.spmak) (ta) (najejah)> on Monday August 22, 2005 @04:37AM (#13370222) Homepage
    Interestingly, do a MD5 hash of 1

    The result is c4ca4238a0b923820dcc509a6f75849b

    Do a google search for that string.

    That results in roughly 2000 hits. That's 2000 people running un-salted hashes...
  • by Anonymous Coward on Monday August 22, 2005 @04:47AM (#13370246)
    It's kind of strange how the moderation of a post can change its meaning. I was reading the parent post when it was modded "+5 interesting". I thought it was a crock, as everyone knows that since hashes have collisions, they cannot be used for lossless (or practical lossy) compression.

    Anyway, I pressed Reload to see if there were any new posts, and stumbled upon the parent again, now moderated "+5 funny". My first thoughts were "what a subtle parody....wait a minute, this looks familiar".
  • Re:Linux (Score:2, Interesting)

    by isorox ( 205688 ) on Monday August 22, 2005 @04:48AM (#13370248) Homepage Journal
    princess
  • Re:Interestingly... (Score:2, Interesting)

    by Antony.S ( 813668 ) on Monday August 22, 2005 @05:45AM (#13370365)
    or 2000 collisions...
  • by irc.goatse.cx troll ( 593289 ) on Monday August 22, 2005 @05:51AM (#13370383) Journal
    They arn't trying to find your password, just find something that has the same MD5. If kf9fqufccqhtqrthcferhwughw has the same hash as slashdot.orgbaadgerlolhy, I can login with either and slashdot wont care. Granted, it will stop a dictonary attack, but your password shouldnt be that weak anyways.
  • Re:Hmmm... (Score:5, Interesting)

    by baadger ( 764884 ) on Monday August 22, 2005 @06:14AM (#13370436)
    function pepperMatch(password, hash) {
    var pepper = ['po', '3g', '37', 'ax'];
    var p;
    for p in pepper {
      if (md5(pepper[p] + password) == hash)
        return true;
    }
    return false;
    }

    Beyond the obvious downside to this (4 times the CPU time for legitimate matches) the advantage is obviously that the cracker has 4 times the bruteforcing to do. But if your security has been comprimised enough to allow someone to find out this hash then you probably have bigger things to worry about.

    Maybe tricks like these will come into their own once people realise just increasing hash length or changing the function isn't going to make them any more secure when users still aren't using 'good' passwords.

    If you think about it hashing your passwords in a database is almost an admittance either that 1) you're database will probably be comprimised or 2) you're users shouldn't trust you. I wonder if it's possible to grep the likes of MySQL's storage files for MD5 hashes (thereby bypassing the databases authentication)?
  • Re:Interestingly... (Score:5, Interesting)

    by stray ( 73778 ) on Monday August 22, 2005 @06:26AM (#13370457) Homepage
    Hm, why did I never try this before :-) ?

    echo -n "trustno1" | md5sum
    5fcfd41e547a12215b173ff47fdd3739

    Google for it, nice vector there.
    Disturbing, to say the least.
  • Pi is better. (Score:3, Interesting)

    by Fantastic Lad ( 198284 ) on Monday August 22, 2005 @09:35AM (#13370866)
    An infinite, non-repeating number must contain ALL possible data, right?

    --Including next week's winning lottery numbers, a picture of your face, blue prints to your house, your brain, and a nice little faster-than-light getaway vehicle and the formula for its shocking-pink meteorite-resistant paint.

    It's just a matter of finding the right sequences. Or building a device which can find those sequences for you upon request. --I call such a device an, "Infinity Box".


    -FL

  • Re:Hmmm... (Score:3, Interesting)

    by hackstraw ( 262471 ) * on Monday August 22, 2005 @11:06AM (#13371967)

    Am I behind the times in modern security?

    AFAIK, for years all *NIX-like systems put their hashes in a root-only readable file (/etc/shadow), and its a prerequisite to either hack root or exploit some rare and obscure local exploit that may dump the contents of the shadow file (core dumps, or whatever).

    Now, as far as I am concerned. Any system that has been root compromised, then all user accounts are assumed to be compromised as well. Instead of only wasting time trying to brute force passwords now that you can access the shadow file, you can add a new account for yourself, modify an existing account with the 'passwd' command, trojan an existing binary (not very useful since most everybody checks their system binaries, right???), or do whatever people do when they root a box (usually something really evil like install an IRC bot).

    I've never understood fascination around password security, when they are probably the least exploited weakness in computers since WOMPR was broken into with the 'joshua' password.

    I've used passphrase protected ssh keys instead of passwords for years. If I had more informed users I would not even allow passworded access via ssh, but that would probably cause me more headaches than its worth. Also, on a side note, does anybody know why the ssh daemon cannot tell if a public key access to the system has been protected with a passphrase? I understand why there are passphraseless keys, but it should be known to the daemon and possible to reject non-protected public keys.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...