Jump to content

Shaun

Dedicated Members
  • Posts

    1,075
  • Joined

  • Last visited

Everything posted by Shaun

  1. You can't decrypt it, because it isn't encrypted as such, it's a one way algorithm. However, you can get the password by brute forcing it, basically trying every possible combination until you find the matching hash.
  2. It is impossible to decrypt MD5, but when you hash a specific string or other piece of data you will always get the same hash, so if you have already computed a hash before and stored the original hash value you can do a reverse lookup sort of thing, those sites just have large databases of precomputed values. Anyway, as I already said this isn't an MD5 hash, it's a MD4 hash salted with the username, making rainbow tables useless. "it let me submit it in MD5" is a meaningless thing, an MD5 hash is just a 128 bit value, in this case represented using hex digits; it looks identical to any random 128 bit value.
  3. Heh, something tells me he might want something slightly stronger than ROT13.
  4. There's a "stop locking all the threads" movement.
  5. Well, not if the AACSLA send Google DMCA takedown notices for all the URLs they list.
  6. You mean this? http://forums.hak5.org/index.php/topic,521...4.html#msg58994
  7. What do you want people to say? Anyway: http://forums.hak5.org/index.php/topic,6399.0.html
  8. The wiki is back up now, please use that to register your intent to come: clicky This isn't a FOSSUG meetup... but you can talk about FOSS if you want. OK, this thing needs to be organised properly soon, August is in less than 2 months and some people need decent advanced notice of details. This thread is to get an idea of how many people are coming, so post here if you intend to come (looks like it will be 2nd weekend of August). Don't start discussing anything else in here, if you want to do that use the other thread, I want to keep this thread clean. The people who are coming so far (I'm only including people who post in this thread) Me Sparda VaKo Moonlit stingwray Cooper cyber_eagle degoba metatron DarkSenay darell108 DeadlyDemon nxt471 (?) stu_Mc djoek
  9. Well the sysctl(3) man page provides descriptions of all the kernel variables, although they are named slightly differently to how you see them when you do sysctl -a.
  10. http://www.freebsd.org/doc/en_US.ISO8859-1...fig-tuning.html
  11. Well I'm sure he's gone home by now, so this thread is irrelevant. His story was obviously a completely fabrication anyway. He had to get the admin password for his laptop - which he doesn't know because apparently he only uses the guest account, don't know how he originally got his software on - because he urgently needed to remove some instant messenger software someone (who?) somehow put on there, because apparently there was a new virus spread via MyspaceIM; this virus zeroes your hard drive if you get it and "they" (same person as before?) said there's nothing that can "block" it. What kind of story is that? Why he couldn't just turn his laptop off until he got home, or disconnect it from the network? Or just close the instant messaging software as I suggested earlier, I don't know.
  12. I'd hope they aren't using MD4, MD5 or SHA1 to encrypt their data, what with those being one-way hash algorithms. It would be kind of useless encryption too, it being impossible to get your data back again. Trying to brute force seems impractical as well, since you are basically trying to brute force the entire plain text. You wouldn't even know when you had the correct plain text, because 1 in every 2^bits (e.g. 2^128 for MD5) possible plain texts will have the same hash; since there is an unlimited number of possible plain texts that can produce the same hash, you will be brute forcing for exactly ? hours to get them all. It is the case though that if they do use any modern decent encryption the only way it's gonna be cracked with the ciphertext alone is brute forcing the key. Which will take a long long time. Like very long.
  13. Well on Skype's site in the download section there's Skype for Mobile, which appears to run on phones which use Pocket PC or Windows Mobile.
  14. I think most people already knew about that. In fact doesn't the Pandora timeshifting thing update your statistics on Last.FM? I'm sure I read that somewhere, although I don't use it.
  15. Hold on, a mouse needs 2 dimensions to work, how would you represent both X and Y with just the left knob?
  16. When it overwrites the old files in those folders won't go anywhere unless they have the same name as songs which Pandora has downloaded.
  17. Also http://www.planet-source-code.com/vb/scrip...06&lngWId=1 Edit: Heh, same site. Edit 2: And for some reason I don't seem to need to login to download from there.
  18. All the library files and components are in the Download section of that site. Although I just realised they're only 30 day evaluations.
  19. Well I assumed he meant the program called screen, which you don't need to use. There'd probably be a pseudo terminal if sshd was running on a *nix machine, but that's a device not a program. sshd is the service, and ssh and sshd are both part of SSH, or OpenSSH, or another implementation. Your apparent assertion that the client isn't part of SSH is wrong.
  20. What? You login with the ssh client.
  21. Shouldn't that be hak5ic or hackic?
×
×
  • Create New...