New Online MD5 Hash Database 295
Gravix writes with a shameless plug for his new site "Sporting over 12 million entries, project GDataOnline is one of the largest non-RainbowTable based MD5 crackers on the internet. The database spans over 7 languages, 35 topics, and contains common mutations to words that include numbers and capitalization. Average crack time for 5 hashes: .04 seconds. No more waiting weeks for your results!" Shameless plug aside, the site still seems worth a closer look.
quick (Score:5, Funny)
Re:quick (Score:2, Interesting)
Re:quick (Score:3, Informative)
oh, i get it! (Score:5, Funny)
Re:oh, i get it! (Score:2, Insightful)
Re:oh, i get it! (Score:5, Funny)
--
This post may be the personal opinion of me and noone else, but it's more likely to be random characters.
Someone mod his sig +5 Insightful.
Re:oh, i get it! (Score:5, Funny)
Re:oh, i get it! (Score:3, Informative)
6436a55a08760c5b94dbed4476f83fcd -
Re:md5summer.exe (Score:2)
> No.
I guess you didn't get his joke, then.
Downloadable database form? (Score:5, Interesting)
Re:Downloadable database form? (Score:5, Informative)
Re:Downloadable database form? (Score:5, Interesting)
Re:Downloadable database form? (Score:4, Insightful)
Try googling for Rainbow Tables.
Re:Downloadable database form? (Score:4, Insightful)
md5(pw);
and not
md5(username + pw);
Salting the the hash with a variable (here: username) helps preventing wide scale probing with rainbow lists in the event the DB gets "stolen".
Re:Downloadable database form? (Score:5, Informative)
It's called a password "salt", and many applications use them. It's much better to use a large random value stored in the clear than the username.
Microsoft, of course, is screwed by the need to provide backward compatibilitty, and does not salt the (MD4-based) NTLMv2 hash stored on Windows systems. They encrypt the whole hash database instead to prevent offline attacks, but this is ineffective as the decryption key is also "hidden" on the system's disk unless you want requrie a diskette/CD/floppy at boot that contains the decryption "syskey".
Re:Downloadable database form? (Score:2)
Unfortunately, I did not design the system. I would not have designed it that way. I probably would have used SHA-1 too.
Which is why I'm considering quitting so I actually get to design stuff properly...
Re:Downloadable database form? (Score:5, Informative)
Re:Downloadable database form? (Score:2)
Hmmm... (Score:5, Insightful)
Re:Hmmm... (Score:5, Funny)
Re:Hmmm... (Score:4, Interesting)
Sound familiar to anyone else? Anyone know if it's used in practice?
Re:Hmmm... (Score:5, Interesting)
var pepper = ['po', '3g', '37', 'ax'];
var p;
for p in pepper {
if (md5(pepper[p] + password) == hash)
return true;
}
return false;
}
Beyond the obvious downside to this (4 times the CPU time for legitimate matches) the advantage is obviously that the cracker has 4 times the bruteforcing to do. But if your security has been comprimised enough to allow someone to find out this hash then you probably have bigger things to worry about.
Maybe tricks like these will come into their own once people realise just increasing hash length or changing the function isn't going to make them any more secure when users still aren't using 'good' passwords.
If you think about it hashing your passwords in a database is almost an admittance either that 1) you're database will probably be comprimised or 2) you're users shouldn't trust you. I wonder if it's possible to grep the likes of MySQL's storage files for MD5 hashes (thereby bypassing the databases authentication)?
Re:Hmmm... (Score:2, Informative)
Yes, but you need shell access to do it.
Re:Hmmm... (Score:2)
It is mostly 2). Your users shouldn't trust you, nor should you trust yourself, unless "you" is truly a single person. Any system that has users logging into it is probably accessible to multi
Re:Hmmm... (Score:3, Informative)
If you think about it hashing your passwords in a database is almost an admittance [tha] you're database will probably be comprimised
No, it's a recognition of the fact that it's at least theoretically possible that your database might be compromised at some point in the future. And anyone who isn't an idiot will design their systems in such a way as to minimize the damage that can be caused by a single point of failure. That's not an admission of incompetence, it's plain common sense.
Another Reason.... (Score:3, Informative)
If the user's password is stored in plain text, they can claim that you, the system administrator, have access to it. This increases your liability as the user can now disclaim responsibility for actions taken with that password, on any other system where it is used -- after all, they could have been impersonated, and they can accuse you of being the culprit.
-Hope
Re:Hmmm... (Score:4, Informative)
Anyway: MD5 hashes over a certain dataset are not unique. Two datasets can result in the same MD5 hash, assuming a fixed has length. This database could point those out too.
As last remark: This kind of database use has been done before by chess engines. By just storing most succesful board setups, the next moves could be executed more effectively and a lot faster.
You might expect that... (Score:3, Interesting)
I was just reviewing some popular browser extensions that create site-specific passwords. Click a widget, enter a keysequence or something like that and they fill in a password that's an MD5 hash of the site name concatenated with a master password from the user.
No salt.
There are probably blackhats out there who have *memorized* the MD5 of "passwordpaypal.com".
Re:You might expect that... (Score:5, Informative)
"slashdot.org<my password>" will render any generic databases like GData useless for Slashdot password searching. It means someone has to build up a Slashdot specific database using a dictionary first. That is all a salt is really for, to inconvenience a dictionary attack.
"slashdot.orgbaadger<my password>" (<site><username><password>) would be better as it means the cracker has to build a database specific to slashdot and my username.
So yes these passwords are salted, using the domain just saves the plugin having to save random salts somewhere.
Re:You might expect that... (Score:2)
Secret, long and random salts known to both sides and never transmitted will produce a MAC.
Re:You might expect that... (Score:3, Interesting)
Re:You might expect that... (Score:2)
Re:You might expect that... (Score:2)
Salt needs to be large, random and generally kept local to the machine doing the authentication (in this case, the machine doing the authentication is the users password repository). Each generated password needs it's own salt.
Re:Hmmm... (Score:2)
Re:Hmmm... (Score:2)
Nobody puts passwords in
Alternatives exist (Kerberos, Samba, LDAP) but they're nowhere near as widespread.
Re:Hmmm... (Score:2, Funny)
Salting *and iterating* (Score:5, Interesting)
In addition, it's best to iterate the hash many times, which slows down dictionary attacks. See Kelsey, Schneier et al, "Secure Applications of Low-Entropy Keys":
http://www.schneier.com/paper-low-entropy.html [schneier.com]
The proofs in that paper are based on the assumption that the hash function is collision free, which of course MD5 isn't; another hash function might be preferable.
Re:Salting *and iterating* (Score:2)
Re:Salting *and iterating* (Score:2)
When you wanted to uncompress, it undeleted the file. Lossless compression, mostly!
WARNING THIS IS A STUPID QUESTION (Score:2)
Re:Hmmm... (Score:2, Informative)
http://en.wikipedia.org/wiki/Salt_(cryptography) [wikipedia.org]
Re:Hmmm... (Score:3, Informative)
Re:Hmmm... (Score:3, Interesting)
Am I behind the times in modern security?
AFAIK, for years all *NIX-like systems put their hashes in a root-only readable file (/etc/shadow), and its a prerequisite to either hack root or exploit some rare and obscure local exploit that may dump the contents of the shadow file (core dumps, or whatever).
Now, as far as I am concerned. Any system that has been root compromised, then all user accounts are assumed to be compromised as well. Instead of only wasting time trying to brute force passwords now that y
Hash Counter (Score:5, Funny)
Bug in counter (Score:2)
Re:Bug in counter (Score:2)
Doesn't seem very useful (Score:5, Insightful)
Re:Doesn't seem very useful (Score:5, Insightful)
You wouldn't by any chance be using the md5sum command line utility and typing a newline after the word? I just tried my own name, which turned out to be in the database. Could you give just a few examples of the hash values you submitted, and the word you expected it to return?
Re:Doesn't seem very useful (Score:5, Informative)
You wouldn't by any chance be using the md5sum command line utility and typing a newline after the word? I just tried my own name, which turned out to be in the database. Could you give just a few examples of the hash values you submitted, and the word you expected it to return?
Oops, right you are, that's exactly what I was doing... tried the same words with echo -n and they were in fact in the database.
/me wipes egg off face
Re:Doesn't seem very useful (Score:2)
Re:Doesn't seem very useful (Score:2, Interesting)
It also seems very limited to dictionary words, there's no attempt at some useful things like IP addresses (I've seen a few BBSes who don't publish
Re:Doesn't seem very useful (Score:2)
As an interesting aside, check out the numbers on the site hosting t
Re:Doesn't seem very useful (Score:2)
f6174179c90c0366b99d7a1d91cf6f4a
Which successfully performs the lookup for me.
So what? (Score:5, Informative)
For many other uses of cryptographic hashes the input is much more than a single word, and typically you don't really worry about keeping the input a secret anyway.
MD5 is nice but... (Score:5, Informative)
A few other places have these, in differing amounts. Rainbowcrack [rainbowcrack.com] has tons of them, but require you to submit some before being allowed to query the system. I did submit a few NTLM hash tables, but it took the better part of a week to get my query back (it's supposed to be a lot faster than that).
There's also Ophcrack [lasecwww.epfl.ch] which uses tables similar to rainbow tables. It has a web interface to query NTLM hashes for simple passwords.
With these pre-computed hash tables, basic password security is starting to take a hit and it's becoming more and more worthwhile to use a simple but long password rather than a short and complex one. If you're on Windows, it's also VERY worthwhile to read about forcing Windows to store only the NTLM hash and drop the LM hash [microsoft.com]. It breaks old compatibility with Win 9x but is very worth it if you don't need that. This helps against precomputed attackes but has an even bigger impact agains brute-force attacks.
Re:MD5 is nice but... (Score:3, Insightful)
Sure, I'm exaggerating a little, but the amount of time I have to spend on password maintenance is nearly making a line item on my time sheet.
Re:MD5 is nice but... (Score:2)
Re:MD5 is nice but... (Score:2)
Approximately 600 systems split between Solaris and AIX, three change management systems (actually 1200 because root gets changed monthly), two VPN solutions and at last count about a dozen different pasword standards.
Kind of sucks the will to live right out of you!
For those that don't know (Score:5, Informative)
There are existing ranbowtables covering basically the entire LM space but, really, you don't need it. A fast dual core chip will crack it in less than a day.
The parent is correct in that in all cases you can you should set Windows to only use NTLM, or better yet NTLMv2. We are (finally) getting to do that at work as we purged the last NT and 98 systems from the domain.
Re:MD5 is nice but... (Score:3, Interesting)
I thought NTLMv2 was MD4, which is still broken according to its inventors?
Windows shouldn't send either NTLM or NTLMv2 (Score:2)
Yeah, NTLMv2 is MD4, which is broken, doesn't allow salting, and doesn't even need to be cracked anymore, just looked up in a Rainbow table.
My question for Windows admins: can I use kerberos for everything in Windows, so it never sends a hash, never ever, ever, across the network? Just TGTs and service tickets encrypted with that hash?
T
Pointless. (Score:3, Insightful)
All in all, this is another ho-hum kind of story.
Re:Pointless. (Score:4, Funny)
In that case, you might try battery...
Advantages (Score:5, Funny)
Take it from me... (Score:4, Funny)
Does not take up as much room, and someone else is responsible for the maintenance. It's too late for me, but you might benefit from my shortsightedness.
Compression Algorithm (Score:2, Funny)
This is quite useful for archival purposes.
The whole idea of information versus random noise is really apparent when you compare which MD5 hashes have personal significance to the set of all possible hashes.
Re:Compression Algorithm (Score:3, Informative)
Re:Compression Algorithm (Score:3, Interesting)
Anyway, I pressed Reload to see if there were any new posts, and stumbled upon the parent again, now moderated "+5 funny". My first thoughts were "what a subtle parody....wait a minute, this looks familiar".
Re:Compression Algorithm (Score:4, Funny)
Your missing a trick.. you could reduce the file of MD5 hashes with MD5, write it down and carry 461 Gb on a postit note!
Re:Compression Algorithm (Score:2)
Yes, and like many other archiving solutions, backup works great but restore is "problematic"...
Re:Compression Algorithm (Score:2)
Pi is better. (Score:3, Interesting)
--Including next week's winning lottery numbers, a picture of your face, blue prints to your house, your brain, and a nice little faster-than-light getaway vehicle and the formula for its shocking-pink meteorite-resistant paint.
It's just a matter of finding the right sequences. Or building a device which can find those sequences for you upon request. --I call such a device an, "Infinity Box".
-FL
Re:Compression Algorithm (Score:2)
Trojan alert (Score:5, Informative)
Re:Trojan alert (Score:2)
Re:Trojan alert (Score:2)
It may sound at first like this would make the web unusable, but it's not really all that bad. It takes two clicks to add a domain to NoScript's whitelist and one click to re-enable a Flash. AdBlock is good for removing the most offensively annoying ads with two clicks.
e1568c571e684e0fb1724da85d215dc0 (Score:2, Interesting)
Quick MD5 Generation page (Score:2)
Interestingly... (Score:3, Interesting)
The result is c4ca4238a0b923820dcc509a6f75849b
Do a google search for that string.
That results in roughly 2000 hits. That's 2000 people running un-salted hashes...
Re:Interestingly... (Score:2, Interesting)
Re:Interestingly... (Score:5, Interesting)
echo -n "trustno1" | md5sum
5fcfd41e547a12215b173ff47fdd3739
Google for it, nice vector there.
Disturbing, to say the least.
Re:Interestingly... (Score:2, Funny)
Re:Interestingly... (Score:2)
Ok, so I tried some, but it didn't work. Too old dump I guess.
reverse-password generation? (Score:2, Funny)
MadCow.
Speed The Fall of md5 (Score:2)
#!
system 'apg -n 5 > okpasswords';
open(passfile, "okpasswords");
while($password = ){
chop $password;
print $password.";";
}
print "\n";
Then just paste 'em in.
Farewell Md5. Thou hast served us surprisingly well.
Re:Slashdot (Score:4, Funny)
Hash Pass
4e9fd9f4624c02685096769364a81d95 slashdot
Yes, it does.
Re:Linux (Score:3, Informative)
Re:Linux (Score:5, Interesting)
In an "intro to linux" course I had to take a while back as part of a general engineer course, I noticed that one of the test machines wasn't using
Re:Linux (Score:5, Interesting)
More often then not people are dumb and easily scared. Every time you do something they don't expect you to do, they might treat you as a criminal, no matter what your intentions. If I'd come across someone else's root password, I'd think twice before telling them. That is, unless I wasn't their boss, or hired by their boss to do this.
BTW, I bet the root password you got was "god", "the plague", or something from the same wavelength:-).
Re:Linux (Score:2)
Re:Linux (Score:2, Interesting)
crack it and print it publicly in the hall way (Score:4, Funny)
The school would be real real dumb to expell or terminate 50 students accounts.
Or if your really brave, get some weed killer and write the password on the front lawn, and watch it magically appear over the weekend. Totally funny and covert. Admins would get the sack and they would be a school legend.
Usual passwords are either startrek or hitch hickers guide related.
Re:Linux (Score:5, Insightful)
This is why it's not a good idea to humiliate people who have more power than you if you have something to lose.
Re:Linux (Score:5, Informative)
Re:Linux (Score:4, Insightful)
Re:wow (Score:4, Informative)
Re:Crypto experts... SHA1? (Score:3, Informative)
It works for any hash function.
Re:Crypto experts... SHA1? (Score:4, Informative)
The upshot is: (1) yes, you can do this, it's just brute-force; (2) it's not as easy with MD-5.
Lea
Re:Crypto experts... SHA1? (Score:2)
Re:Crypto experts... SHA1? (Score:2)