lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1080068198.558.58.camel@localhost> From: frank at knobbe.us (Frank Knobbe) Subject: RE: Sarca rainbow tables on-line cracking service On Tue, 2004-03-23 at 12:00, James.Cupps@...pi.com wrote: > Ok everybody let's send our LM Hashes and email addresses to this group of > complete strangers. Sounds like a great idea. 1) It wouldn't be MY hashes: email address != LM hashes 2) They still don't have the user account name: email address != user ID 3) Which system are they from? They don't know: ID + password = host(x) |where x is undefined 4) Hashes don't need to be valid anymore: <insert witty function about password over time here> But I agree, it's probably not a good idea to send these to an untrusted party. Would make for an interesting project though: What information (except favorite color and shoe size) could you derive from a password hash... Cheers, Frank -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 187 bytes Desc: This is a digitally signed message part Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040323/b2fa8f81/attachment.bin
Powered by blists - more mailing lists