lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <E17jjDk-0001dE-00.2002-08-27-17-29-37@mail18.svr.pol.co.uk> From: mail at blazde.co.uk (Roland Postle) Subject: Re: Take the trash-talker challenge! >Now hash consists of 16 characters 0-9, a-f. That's 16^16 or 2^64 >possible hashes. And hash is used as the key. So, effectively, you're >using 64 bit keys. > >It's too large a key space to brute-force in 10 minutes for me, but it >should be obvious that it's a severe flaw nonetheless. Unless it's a lame key or someone has a Japanese earth simulator lying around I don't see it being cracked in a week either. But this is surely worth another $50. Aliver, it might have cost you a hundred big ones, but this thread made me laugh. Thanks. Let's have more quality entertainment like this on Full-Disclosure. - Blazde
Powered by blists - more mailing lists