pass help
am 05.04.2007 07:32:16 von jake658879does anyone know what type of pass this is, and how to decode it?
69-136-250-44-59-50-76-157-155-157-76-250-183-125-27-242
does anyone know what type of pass this is, and how to decode it?
69-136-250-44-59-50-76-157-155-157-76-250-183-125-27-242
"jake658879"
> does anyone know what type of pass this is, and how to decode it?
> 69-136-250-44-59-50-76-157-155-157-76-250-183-125-27-242
Well... where did you find it?
--
Todd H.
http://www.toddh.net/
Todd H. wrote:
> "jake658879"
>
> > does anyone know what type of pass this is, and how to decode it?
> > 69-136-250-44-59-50-76-157-155-157-76-250-183-125-27-242
>
> Well... where did you find it?
>
> --
> Todd H.
> http://www.toddh.net/
It was a password automatically coded from my brothers um....
runescape private server. It is this same type for anyone who makes an
account on the server.
In article <1175751136.268011.116680@p77g2000hsh.googlegroups.com>,
jake658879
>does anyone know what type of pass this is, and how to decode it?
>69-136-250-44-59-50-76-157-155-157-76-250-183-125-27-242
If each grouping is interpreted as the decimal value of a byte,
then you have exactly 16 8-bit bytes, which would be 128 bits --
not uncommon as a key size.
But it doesn't have to be a password at all: it could be the MD5 hash
of a password. When the user types in their password, the MD5 hash
of the entered password could be taken and that result compared to
the stored hash. If that is what is happening, then there is
no known way of decoding the value, other than "dictionary attacks"
and "brute force". (There are other weaknesses with MD5 though; see
http://en.wikipedia.org/wiki/MD5 )
"jake658879"
> > > does anyone know what type of pass this is, and how to decode it?
> > > 69-136-250-44-59-50-76-157-155-157-76-250-183-125-27-242
> >
> > Well... where did you find it?
>
> It was a password automatically coded from my brothers um....
> runescape private server. It is this same type for anyone who makes an
> account on the server.
This sure is a hash value of some sort, possibly MD5. Have a look at
Walter's post. By the way, if you're trying to break passwords (as you
sound), you will end up doing bruteforce attacks, if it's really MD5.
In other words, look for an alternative hobby.
Regards,
Ertugrul Söylemez.
--=20
=46rom the fact that this CGI program has been written in Haskell, it
follows naturally that this CGI program is perfectly secure.