Feefty Posted November 14, 2012 Group: Members Topic Count: 47 Topics Per Day: 0.01 Content Count: 175 Reputation: 14 Joined: 11/21/11 Last Seen: April 18, 2020 Share Posted November 14, 2012 should i use the md5 password or just stick to plain one? because i think md5 is easy to crack and it doesn't matter if i hash my password. Quote Link to comment Share on other sites More sharing options...
michaelsoftman Posted November 14, 2012 Group: Members Topic Count: 48 Topics Per Day: 0.01 Content Count: 410 Reputation: 29 Joined: 04/04/12 Last Seen: November 28, 2024 Share Posted November 14, 2012 (edited) If MD5 is easy to crack, tell me what this password is. d16725300976db1641d4663d9c13a9e2 But in all seriousness, you should hash your passwords. There's no reason not to, and it keeps amateurs from messing with your server. Edited November 14, 2012 by michaelsoftman Quote Link to comment Share on other sites More sharing options...
Feefty Posted November 14, 2012 Group: Members Topic Count: 47 Topics Per Day: 0.01 Content Count: 175 Reputation: 14 Joined: 11/21/11 Last Seen: April 18, 2020 Author Share Posted November 14, 2012 (edited) If MD5 is easy to crack, tell me what this password is. d16725300976db1641d4663d9c13a9e2 But in all seriousness, you should hash your passwords. There's no reason not to, and it keeps amateurs from messing with your server. i hate you too. i guess so yeah. but is it possible to use different hash? Edited November 14, 2012 by Feefty Quote Link to comment Share on other sites More sharing options...
Dastgir Posted November 14, 2012 Group: Members Topic Count: 26 Topics Per Day: 0.01 Content Count: 331 Reputation: 63 Joined: 11/29/11 Last Seen: 16 hours ago Share Posted November 14, 2012 If MD5 is easy to crack, tell me what this password is. d16725300976db1641d4663d9c13a9e2 But in all seriousness, you should hash your passwords. There's no reason not to, and it keeps amateurs from messing with your server. If MD5 is easy to crack, tell me what this password is. d16725300976db1641d4663d9c13a9e2 But in all seriousness, you should hash your passwords. There's no reason not to, and it keeps amateurs from messing with your server. i hate you too. i guess so yeah. but is it possible to use different hash? Its "I hate you." not "i hate you too." Quote Link to comment Share on other sites More sharing options...
nanakiwurtz Posted November 14, 2012 Group: Members Topic Count: 81 Topics Per Day: 0.02 Content Count: 1654 Reputation: 583 Joined: 08/09/12 Last Seen: January 14, 2020 Share Posted November 14, 2012 If MD5 is easy to crack, tell me what this password is. I hate you. Quote Link to comment Share on other sites More sharing options...
Feefty Posted November 14, 2012 Group: Members Topic Count: 47 Topics Per Day: 0.01 Content Count: 175 Reputation: 14 Joined: 11/21/11 Last Seen: April 18, 2020 Author Share Posted November 14, 2012 (edited) If MD5 is easy to crack, tell me what this password is. d16725300976db1641d4663d9c13a9e2 But in all seriousness, you should hash your passwords. There's no reason not to, and it keeps amateurs from messing with your server. If MD5 is easy to crack, tell me what this password is. d16725300976db1641d4663d9c13a9e2 But in all seriousness, you should hash your passwords. There's no reason not to, and it keeps amateurs from messing with your server. i hate you too. i guess so yeah. but is it possible to use different hash? Its "I hate you." not "i hate you too." lol. i know, im just saying i hate him too. Edited November 14, 2012 by Feefty Quote Link to comment Share on other sites More sharing options...
michaelsoftman Posted November 14, 2012 Group: Members Topic Count: 48 Topics Per Day: 0.01 Content Count: 410 Reputation: 29 Joined: 04/04/12 Last Seen: November 28, 2024 Share Posted November 14, 2012 Haha, I feel the love in this thread. <3 Seriously though. Hashing it can keep some people from doing anything if they somehow gain access to your login DB. But then again, if you just focus DB security instead, that would be the better option. There's no real reason not to MD5 them though. Quote Link to comment Share on other sites More sharing options...
Mystery Posted November 15, 2012 Group: Members Topic Count: 94 Topics Per Day: 0.02 Content Count: 2192 Reputation: 253 Joined: 11/11/11 Last Seen: June 24, 2020 Share Posted November 15, 2012 Guys, keep on track with the topic... few replies without even constructive feedback. As for good security, as mentioned above, MD5 isn't always the best.. yes, it's good when it comes to people who can't crack it, but people who can crack can obviously get around it. Another way is to make sure you do not use easy guessed passwords for your different databases etc. Getting hashed passwords is also beneficial. You as an owner will always want to take necessary precautions to protect your server (well, you should). Quote Link to comment Share on other sites More sharing options...
Lighta Posted November 15, 2012 Group: Members Topic Count: 16 Topics Per Day: 0.00 Content Count: 737 Reputation: 216 Joined: 11/29/11 Last Seen: December 20, 2020 Share Posted November 15, 2012 well md5 is easy to crack when you use real world as password since it's already in dictionary but just try with some number in it and it'll get way more complicate like : 6ffe7c349a183a182671f828d786d137 Quote Link to comment Share on other sites More sharing options...
Mystery Posted November 15, 2012 Group: Members Topic Count: 94 Topics Per Day: 0.02 Content Count: 2192 Reputation: 253 Joined: 11/11/11 Last Seen: June 24, 2020 Share Posted November 15, 2012 well md5 is easy to crack when you use real world as password since it's already in dictionary but just try with some number in it and it'll get way more complicate like : 6ffe7c349a183a182671f828d786d137 Ahh. I've personally never used MD5 in my servers so I haven't really experienced it working all I knew that it added a tad more security. Quote Link to comment Share on other sites More sharing options...
Dastgir Posted November 15, 2012 Group: Members Topic Count: 26 Topics Per Day: 0.01 Content Count: 331 Reputation: 63 Joined: 11/29/11 Last Seen: 16 hours ago Share Posted November 15, 2012 well md5 is easy to crack when you use real world as password since it's already in dictionary but just try with some number in it and it'll get way more complicate like : 6ffe7c349a183a182671f828d786d137 +1 If there's much complicated password in md5, its very less percent chance to crack it down, BUT, Often Players use easy passwords. No Player would input hard/long passwords for logging in server everyday. Quote Link to comment Share on other sites More sharing options...
Mystery Posted November 15, 2012 Group: Members Topic Count: 94 Topics Per Day: 0.02 Content Count: 2192 Reputation: 253 Joined: 11/11/11 Last Seen: June 24, 2020 Share Posted November 15, 2012 well md5 is easy to crack when you use real world as password since it's already in dictionary but just try with some number in it and it'll get way more complicate like : 6ffe7c349a183a182671f828d786d137 +1 If there's much complicated password in md5, its very less percent chance to crack it down, BUT, Often Players use easy passwords. No Player would input hard/long passwords for logging in server everyday. Well then, wouldn't that be their fault then? If they get hacked, it'd be their fault but then complain to the Admin Quote Link to comment Share on other sites More sharing options...
Dastgir Posted November 15, 2012 Group: Members Topic Count: 26 Topics Per Day: 0.01 Content Count: 331 Reputation: 63 Joined: 11/29/11 Last Seen: 16 hours ago Share Posted November 15, 2012 well md5 is easy to crack when you use real world as password since it's already in dictionary but just try with some number in it and it'll get way more complicate like : 6ffe7c349a183a182671f828d786d137 +1 If there's much complicated password in md5, its very less percent chance to crack it down, BUT, Often Players use easy passwords. No Player would input hard/long passwords for logging in server everyday. Well then, wouldn't that be their fault then? If they get hacked, it'd be their fault but then complain to the Admin But they don't understand its their own fault. But As I Think, Its admin fault also for low security of the databases. Keep very hard passwords for vps and sql, and ddos protected, and then its no chance to get hacked. Quote Link to comment Share on other sites More sharing options...
phebs Posted November 15, 2012 Group: Members Topic Count: 11 Topics Per Day: 0.00 Content Count: 57 Reputation: 0 Joined: 09/13/12 Last Seen: November 18, 2013 Share Posted November 15, 2012 yes just convert the default has to other has since its on the db, so i think yes Quote Link to comment Share on other sites More sharing options...
Lighta Posted November 15, 2012 Group: Members Topic Count: 16 Topics Per Day: 0.00 Content Count: 737 Reputation: 216 Joined: 11/29/11 Last Seen: December 20, 2020 Share Posted November 15, 2012 You could change your registration form to require some number in it or thing like that, (that what they usually do, you're pass is too weak, you're pass require 3 number etc...) Otherwise you could always rehash pass by a configured sel. I think I'll do a diff for that. This will probably lower encryption as I didn't study the redundancy etc but if you looking at it I doubt you'll have someone who really gonna writte something to crack your encryption, most of time it's script kiddy that use md5 decrypt site to found pass. And as I said those site work with dictionary, they have a hash of md5 keys corresponding to with pass and there you go, so if you're pass it's not common have weird letter in it etc it's probably not referenced yet. Quote Link to comment Share on other sites More sharing options...
KeyWorld Posted November 15, 2012 Group: Members Topic Count: 9 Topics Per Day: 0.00 Content Count: 379 Reputation: 304 Joined: 11/10/11 Last Seen: December 2, 2014 Share Posted November 15, 2012 Otherwise you could always rehash pass by a configured sel. Agree, it's the easer way to ""secure"" all passwords without changing/adding a lot of code, this is what I used in the past. Quote Link to comment Share on other sites More sharing options...
nanakiwurtz Posted November 15, 2012 Group: Members Topic Count: 81 Topics Per Day: 0.02 Content Count: 1654 Reputation: 583 Joined: 08/09/12 Last Seen: January 14, 2020 Share Posted November 15, 2012 Add more salt please Quote Link to comment Share on other sites More sharing options...
Lighta Posted November 16, 2012 Group: Members Topic Count: 16 Topics Per Day: 0.00 Content Count: 737 Reputation: 216 Joined: 11/29/11 Last Seen: December 20, 2020 Share Posted November 16, 2012 Here try this for a quick salt, not exactly what I was using but should be easier like that, ofc you can make it harder if you wish : http://upaste.me/04d51583d10fd52c Don't forget to change the passphrase otherwise won't be that usefull. Also you'll need to change new account creation insert in db for : "insert into login(user_pass) values( md5(concat(inputpasswd,mypasskey)) ); " yes that an incomplete sql query for registration but it's just to show password change in registration. To update you db it'll be update login set user_pass= md5(concat(user_pass,mypasskey); //well this assume you didn't had md5 enable yet and ofc after this you'll need to enable md5. if you already had it enable I'm afraid I don't have a generic solution unless you may try to decrypt all md5 first but I'd not recommend it, better to ask user to renew their pass 1 Quote Link to comment Share on other sites More sharing options...
Feefty Posted November 16, 2012 Group: Members Topic Count: 47 Topics Per Day: 0.01 Content Count: 175 Reputation: 14 Joined: 11/21/11 Last Seen: April 18, 2020 Author Share Posted November 16, 2012 Here try this for a quick salt, not exactly what I was using but should be easier like that, ofc you can make it harder if you wish : http://upaste.me/04d51583d10fd52c Don't forget to change the passphrase otherwise won't be that usefull. Also you'll need to change new account creation insert in db for : "insert into login(user_pass) values( md5(concat(inputpasswd,mypasskey)) ); " yes that an incomplete sql query for registration but it's just to show password change in registration. To update you db it'll be update login set user_pass= md5(concat(user_pass,mypasskey); //well this assume you didn't had md5 enable yet and ofc after this you'll need to enable md5. if you already had it enable I'm afraid I don't have a generic solution unless you may try to decrypt all md5 first but I'd not recommend it, better to ask user to renew their pass thanks, ill try this. Quote Link to comment Share on other sites More sharing options...
malufett Posted November 16, 2012 Group: Members Topic Count: 9 Topics Per Day: 0.00 Content Count: 554 Reputation: 70 Joined: 04/04/12 Last Seen: November 8, 2013 Share Posted November 16, 2012 Here try this for a quick salt, not exactly what I was using but should be easier like that, ofc you can make it harder if you wish :http://upaste.me/04d51583d10fd52c Don't forget to change the passphrase otherwise won't be that usefull. Also you'll need to change new account creation insert in db for : "insert into login(user_pass) values( md5(concat(inputpasswd,mypasskey)) ); " yes that an incomplete sql query for registration but it's just to show password change in registration. To update you db it'll be update login set user_pass= md5(concat(user_pass,mypasskey); //well this assume you didn't had md5 enable yet and ofc after this you'll need to enable md5. if you already had it enable I'm afraid I don't have a generic solution unless you may try to decrypt all md5 first but I'd not recommend it, better to ask user to renew their pass this is not effective since the additional security encryption is done in server side and not in the client side.. traditional way : client(hashed) --[pass:test]-->server-->[check db]-->(success/fail) I'm hacker I get this † (boom I know your pass) +salt client(hashed) --[pass:test]-->server-->[check db+salt]-->(success/fail) I'm hacker I get this † (boom I also know your pass) anyway this is useful if the attacker/hacker is in the server side.. Quote Link to comment Share on other sites More sharing options...
KeyWorld Posted November 16, 2012 Group: Members Topic Count: 9 Topics Per Day: 0.00 Content Count: 379 Reputation: 304 Joined: 11/10/11 Last Seen: December 2, 2014 Share Posted November 16, 2012 this is not effective since the additional security encryption is done in server side and not in the client side..traditional way : client(hashed) --[pass:test]-->server-->[check db]-->(success/fail) I'm hacker I get this † (boom I know your pass) +salt client(hashed) --[pass:test]-->server-->[check db+salt]-->(success/fail) I'm hacker I get this † (boom I also know your pass) anyway this is useful if the attacker/hacker is in the server side.. I don't get it. A hash is a hash, you can't reverse it you have to brute force all possibles combinations to have it. Even if the hacker know the key, if it's a complicate key you will not be able to reverse the hash without testing all possibilities. And yeah it's useful only if the attacker/hacker own an access to the server (even if in this case, there are other ways to get passwords). Quote Link to comment Share on other sites More sharing options...
malufett Posted November 16, 2012 Group: Members Topic Count: 9 Topics Per Day: 0.00 Content Count: 554 Reputation: 70 Joined: 04/04/12 Last Seen: November 8, 2013 Share Posted November 16, 2012 I don't get it.A hash is a hash, you can't reverse it you have to brute force all possibles combinations to have it. hahaha..I mean if the password used is in the dictionary cause I'm basing my example on the password given at later post..and I also stated there "pass:test" Quote Link to comment Share on other sites More sharing options...
KeyWorld Posted November 16, 2012 Group: Members Topic Count: 9 Topics Per Day: 0.00 Content Count: 379 Reputation: 304 Joined: 11/10/11 Last Seen: December 2, 2014 Share Posted November 16, 2012 Ok I now understand the "pass:test" thing lol, of course the secret key have to be strong Quote Link to comment Share on other sites More sharing options...
Akinari Posted November 16, 2012 Group: Members Topic Count: 32 Topics Per Day: 0.01 Content Count: 247 Reputation: 207 Joined: 10/23/12 Last Seen: March 2, 2022 Share Posted November 16, 2012 Well there are the <passwordencrypt> and <passwordencrypt2> clientinfo functions which I haven't delved extremely deep into but I see that they are supported (at least there are checks) on the server side. I believe that is what malufett was referring to in the previous post was that the client generally sends password plaintext. Sending a password plaintext is not a good thing. Quote Link to comment Share on other sites More sharing options...
Question
Feefty
should i use the md5 password or just stick to plain one?
because i think md5 is easy to crack and it doesn't matter if i hash my password.
Link to comment
Share on other sites
23 answers to this question
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.