New Online MD5 Hash Database 295
Gravix writes with a shameless plug for his new site "Sporting over 12 million entries, project GDataOnline is one of the largest non-RainbowTable based MD5 crackers on the internet. The database spans over 7 languages, 35 topics, and contains common mutations to words that include numbers and capitalization. Average crack time for 5 hashes: .04 seconds. No more waiting weeks for your results!" Shameless plug aside, the site still seems worth a closer look.
Downloadable database form? (Score:5, Interesting)
Re:Doesn't seem very useful (Score:2, Interesting)
It also seems very limited to dictionary words, there's no attempt at some useful things like IP addresses (I've seen a few BBSes who don't publish IPs, but instead publish hashes).
Re:Linux (Score:5, Interesting)
In an "intro to linux" course I had to take a while back as part of a general engineer course, I noticed that one of the test machines wasn't using
Re:Linux (Score:5, Interesting)
More often then not people are dumb and easily scared. Every time you do something they don't expect you to do, they might treat you as a criminal, no matter what your intentions. If I'd come across someone else's root password, I'd think twice before telling them. That is, unless I wasn't their boss, or hired by their boss to do this.
BTW, I bet the root password you got was "god", "the plague", or something from the same wavelength:-).
You might expect that... (Score:3, Interesting)
I was just reviewing some popular browser extensions that create site-specific passwords. Click a widget, enter a keysequence or something like that and they fill in a password that's an MD5 hash of the site name concatenated with a master password from the user.
No salt.
There are probably blackhats out there who have *memorized* the MD5 of "passwordpaypal.com".
Re:MD5 is nice but... (Score:3, Interesting)
I thought NTLMv2 was MD4, which is still broken according to its inventors?
Re:Hmmm... (Score:4, Interesting)
Sound familiar to anyone else? Anyone know if it's used in practice?
Salting *and iterating* (Score:5, Interesting)
In addition, it's best to iterate the hash many times, which slows down dictionary attacks. See Kelsey, Schneier et al, "Secure Applications of Low-Entropy Keys":
http://www.schneier.com/paper-low-entropy.html [schneier.com]
The proofs in that paper are based on the assumption that the hash function is collision free, which of course MD5 isn't; another hash function might be preferable.
Re:quick (Score:2, Interesting)
Re:Downloadable database form? (Score:5, Interesting)
e1568c571e684e0fb1724da85d215dc0 (Score:2, Interesting)
Interestingly... (Score:3, Interesting)
The result is c4ca4238a0b923820dcc509a6f75849b
Do a google search for that string.
That results in roughly 2000 hits. That's 2000 people running un-salted hashes...
Re:Compression Algorithm (Score:3, Interesting)
Anyway, I pressed Reload to see if there were any new posts, and stumbled upon the parent again, now moderated "+5 funny". My first thoughts were "what a subtle parody....wait a minute, this looks familiar".
Re:Linux (Score:2, Interesting)
Re:Interestingly... (Score:2, Interesting)
Re:You might expect that... (Score:3, Interesting)
Re:Hmmm... (Score:5, Interesting)
var pepper = ['po', '3g', '37', 'ax'];
var p;
for p in pepper {
if (md5(pepper[p] + password) == hash)
return true;
}
return false;
}
Beyond the obvious downside to this (4 times the CPU time for legitimate matches) the advantage is obviously that the cracker has 4 times the bruteforcing to do. But if your security has been comprimised enough to allow someone to find out this hash then you probably have bigger things to worry about.
Maybe tricks like these will come into their own once people realise just increasing hash length or changing the function isn't going to make them any more secure when users still aren't using 'good' passwords.
If you think about it hashing your passwords in a database is almost an admittance either that 1) you're database will probably be comprimised or 2) you're users shouldn't trust you. I wonder if it's possible to grep the likes of MySQL's storage files for MD5 hashes (thereby bypassing the databases authentication)?
Re:Interestingly... (Score:5, Interesting)
echo -n "trustno1" | md5sum
5fcfd41e547a12215b173ff47fdd3739
Google for it, nice vector there.
Disturbing, to say the least.
Pi is better. (Score:3, Interesting)
--Including next week's winning lottery numbers, a picture of your face, blue prints to your house, your brain, and a nice little faster-than-light getaway vehicle and the formula for its shocking-pink meteorite-resistant paint.
It's just a matter of finding the right sequences. Or building a device which can find those sequences for you upon request. --I call such a device an, "Infinity Box".
-FL
Re:Hmmm... (Score:3, Interesting)
Am I behind the times in modern security?
AFAIK, for years all *NIX-like systems put their hashes in a root-only readable file (/etc/shadow), and its a prerequisite to either hack root or exploit some rare and obscure local exploit that may dump the contents of the shadow file (core dumps, or whatever).
Now, as far as I am concerned. Any system that has been root compromised, then all user accounts are assumed to be compromised as well. Instead of only wasting time trying to brute force passwords now that you can access the shadow file, you can add a new account for yourself, modify an existing account with the 'passwd' command, trojan an existing binary (not very useful since most everybody checks their system binaries, right???), or do whatever people do when they root a box (usually something really evil like install an IRC bot).
I've never understood fascination around password security, when they are probably the least exploited weakness in computers since WOMPR was broken into with the 'joshua' password.
I've used passphrase protected ssh keys instead of passwords for years. If I had more informed users I would not even allow passworded access via ssh, but that would probably cause me more headaches than its worth. Also, on a side note, does anybody know why the ssh daemon cannot tell if a public key access to the system has been protected with a passphrase? I understand why there are passphraseless keys, but it should be known to the daemon and possible to reject non-protected public keys.