lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 8 Jan 2007 15:47:51 -0500
From: "T Biehn" <tbiehn@...il.com>
To: Full-Disclosure@...ts.grok.org.uk
Subject: Fwd: Flog 1.1.2 Remote Admin Password Disclosure

---------- Forwarded message ----------
From: T Biehn <tbiehn@...il.com>
Date: Jan 8, 2007 3:06 PM
Subject: Re: [Full-disclosure] Flog 1.1.2 Remote Admin Password Disclosure
To: endrazine <endrazine@...il.com>

How are you guys still arguing about this?
It wasn't even a troll.

It's called a one-way-hash for a reason.

Oh and if someone comes out with quantum computers tomorrow we could factor
RSA, so we better start putting out SSL advisories.

Slippery slope indeed.

On 1/8/07, endrazine <endrazine@...il.com> wrote:
>
> typos :
>
> endrazine a écrit :
> > Here again, I agree. Now, if one needs to exhaustively try every
> > possible 32b hashes with the largest possible charset (or even bigger
> hashes
> > with a smaller - like those alphanumerical keys you just mentionned), to
>
> > break a password hash, the it's not a "*BIG*" security issue like
> > mentionned earlier imho.
> >
> s/hashes/passwords/ indeed
>
> Cheers,
>
> endrazine-
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ