flat assembler
Message board for the users of flat assembler.

Index > Windows > MD5 Cracking

Goto page Previous  1, 2
Author
Thread Post new topic Reply to topic
comrade



Joined: 16 Jun 2003
Posts: 1137
Location: Russian Federation
comrade
Bogdan is too good for us
Post 28 Aug 2005, 21:48
View user's profile Send private message Visit poster's website AIM Address Yahoo Messenger MSN Messenger ICQ Number Reply with quote
revolution
When all else fails, read the source


Joined: 24 Aug 2004
Posts: 17665
Location: In your JS exploiting you and your system
revolution
Reversing is important in one particular aspect that I can think of. That is: seeing if your current protection scheme/algorithm/trick is good. eg. What if I use MD5 for all my passwords in a website and then discover too late that people can break it in a matter of seconds? That would be disasterous. So instead I learn all about the reversing techniques and then try them for myself to see if I am putting my data at risk.

If MD5 really is easy to break then it is important to discover that and change to a different (and hopefully stronger) algorithm.

Besides, if my understanding is correct, then the process of reverse engineering is NOT illegal in MOST (not all) countries, it is usually what you do with the results that may make what you did illegal.
Post 29 Aug 2005, 05:57
View user's profile Send private message Visit poster's website Reply with quote
RedGhost



Joined: 18 May 2005
Posts: 443
Location: BC, Canada
RedGhost
revolution wrote:

Besides, if my understanding is correct, then the process of reverse engineering is NOT illegal in MOST (not all) countries, it is usually what you do with the results that may make what you did illegal.


i am not against reverse engineering at all, hell i got my coding 'career' started by programming game cheats/hacks but usually the license provided with the program specifies that it isn't to be re, so it would be illegal
Post 29 Aug 2005, 06:18
View user's profile Send private message AIM Address MSN Messenger Reply with quote
vid
Verbosity in development


Joined: 05 Sep 2003
Posts: 7105
Location: Slovakia
vid
Quote:
i am not against reverse engineering at all, hell i got my coding 'career' started by programming game cheats/hacks but usually the license provided with the program specifies that it isn't to be re, so it would be illegal

In our (Slovak) law license can't forbid you something that law does allow. And if license forbids you something like that, then that part of licensce isn't valid. So you *can* reverse engineer in Slovakia ("to preserve compatibility"), i got that confirmed from lawyer who was co-creating these laws in our country Smile
Post 29 Aug 2005, 09:33
View user's profile Send private message Visit poster's website AIM Address MSN Messenger ICQ Number Reply with quote
RedGhost



Joined: 18 May 2005
Posts: 443
Location: BC, Canada
RedGhost
vid wrote:
Quote:
i am not against reverse engineering at all, hell i got my coding 'career' started by programming game cheats/hacks but usually the license provided with the program specifies that it isn't to be re, so it would be illegal

In our (Slovak) law license can't forbid you something that law does allow. And if license forbids you something like that, then that part of licensce isn't valid. So you *can* reverse engineer in Slovakia ("to preserve compatibility"), i got that confirmed from lawyer who was co-creating these laws in our country Smile

haha, if i ever want to become a full time cracker i will catch a plane to Slovakia Cool
Post 29 Aug 2005, 11:30
View user's profile Send private message AIM Address MSN Messenger Reply with quote
bogdanontanu



Joined: 07 Jan 2004
Posts: 403
Location: Sol. Earth. Europe. Romania. Bucuresti
bogdanontanu
comrade wrote:
Bogdan is too good for us


No, I am not too good for you...

I am exactly like everybody else arround here, and I guess that everybody can be like me with very little but honest and passionate efforts.

_________________
"Any intelligent fool can make things bigger,
more complex, and more violent.
It takes a touch of genius -- and a lot of courage --
to move in the opposite direction."
Post 29 Aug 2005, 17:25
View user's profile Send private message Visit poster's website Reply with quote
El Tangas



Joined: 11 Oct 2003
Posts: 120
Location: Sunset Empire
El Tangas
Here is something that I would really like to see reverse engineered, thats the direct assembly code of GPUs. All that FPU power only acessible trough drivers and use mostly for games...
Post 29 Aug 2005, 20:18
View user's profile Send private message Reply with quote
zikachu



Joined: 30 Aug 2005
Posts: 1
zikachu
for md5 cracking, if you want check it..

http://www.hashchecker.com



# Checking md5 1 - 7 length plain text which is prepearing charlist 1.
charlist 1 - [abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789] - 99.99%

# We are now checking md5 1 - 8 length plain text which is prepearing charlist 2.
charlist 2 - [abcdefghijklmnopqrstuvwxyz0123456789] - [ 1 - 8 character ] - 98.50% (will be 99.9%)


# Prepearing [ md5 ]
charlist 3 - [0123456789] [ 1 - 12 character]
charlist 4 - [abcdefghijklmnopqrstuvwxyz] [ 9 - 9 character ]
Post 30 Aug 2005, 22:28
View user's profile Send private message Reply with quote
THEWizardGenius



Joined: 14 Jan 2005
Posts: 382
Location: California, USA
THEWizardGenius
I don't understand. What is the point of that site?

There are a lot of good things about some types of cracking, and a lot of bad things about other types. There is good cracking, bad cracking, and sometimes-good-sometimes-bad cracking. What is NOT good is to break into someones computer, steal files, put viruses on their computer, etc. This we all know. What vid is trying to point out is that there are good types of cracking, such as cracking in order to learn. In fact, breaking into someones computer could even be good, so long as you do no damage. You could even leave a note that their computer is vulnerable.

There are also types of cracking that can be either good or bad, depending on how you do them. As mentioned above, breaking into someone's computer may be good or bad. Cracking into shareware/demo software to avoid paying the licensing fee is wrong, but doing it simply to learn, so long as you don't share how you did it with anyone (except to let them learn too) is OK with me.

_________________
FASM Rules!
OS Dev is fun!
Pepsi tastes nasty!
Some ants toot!
It's over!
Post 31 Aug 2005, 02:52
View user's profile Send private message AIM Address Reply with quote
sylwek32



Joined: 27 Apr 2006
Posts: 339
sylwek32
Maybe somebody wants to make a Port for OpenMosix Linux version?
Very Happy
Post 30 Aug 2006, 14:51
View user's profile Send private message Reply with quote
vid
Verbosity in development


Joined: 05 Sep 2003
Posts: 7105
Location: Slovakia
vid
btw, some Czech guy already beaten MD5 - he can create collision in half of minute (if you haven't heard yet)
Post 31 Aug 2006, 04:59
View user's profile Send private message Visit poster's website AIM Address MSN Messenger ICQ Number Reply with quote
f0dder



Joined: 19 Feb 2004
Posts: 3170
Location: Denmark
f0dder
vid wrote:
btw, some Czech guy already beaten MD5 - he can create collision in half of minute (if you haven't heard yet)


Rainbow tables or some other weakness? Got Link(TM)?

_________________
Image - carpe noctem
Post 31 Aug 2006, 13:09
View user's profile Send private message Visit poster's website Reply with quote
sylwek32



Joined: 27 Apr 2006
Posts: 339
sylwek32
@vid.. i am interested in the link..
Post 31 Aug 2006, 17:28
View user's profile Send private message Reply with quote
f0dder



Joined: 19 Feb 2004
Posts: 3170
Location: Denmark
f0dder
A quick google revealed this, but I'd like some more info... and too tired to refine google searches Smile
Post 31 Aug 2006, 21:58
View user's profile Send private message Visit poster's website Reply with quote
velox



Joined: 06 Jan 2006
Posts: 14
velox
here is more information about this topic:

http://cryptography.hyperlink.cz/MD5_collisions.html

but, from what i understand it's not possible to calculate a collision without having enough input bytes, as passwords are seldomly as long as files.
or am i wrong?
Post 01 Sep 2006, 06:15
View user's profile Send private message Reply with quote
Display posts from previous:
Post new topic Reply to topic

Jump to:  
Goto page Previous  1, 2

< Last Thread | Next Thread >
Forum Rules:
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Copyright © 1999-2020, Tomasz Grysztar. Also on GitHub, YouTube, Twitter.

Website powered by rwasa.