lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8ba534860606282338o3a1f6acel276e780eea3d971@mail.gmail.com>
Date: Thu Jun 29 07:38:46 2006
From: sirdarckcat at gmail.com (SirDarckCat)
Subject: Teagames cheating

Hello List.

I've discovered the cryptogram that the famous site "Teagames" use for
encripting the score and username for the topscores.. I've show the teagames
STAFF several times that I can do this, but they seem that they dont care,
so know, by publising this information I want to force them to change their
cryptogram to a safer one.

Here are the explanation of how I did the cryptoanalisis and the tools
needed for the falsification of the request.

English Version:
http://sirdarckcat.googlepages.com/teagames-cheating

Spanish Version:
http://sirdarckcat.googlepages.com/teagamescheating

Original advisory:
http://foro.elhacker.net/index.php/topic,128534.0.html


Greetings!

-- 
Att.
SirDarckCat@...il.com

http://www.google.com/search?q=sirdarckcat
http://sirdarckcat.googlepages.com/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060629/35a7fea3/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ