Jump to content
  • 0

MD5 password


Feefty

Question


  • Group:  Members
  • Topic Count:  47
  • Topics Per Day:  0.01
  • Content Count:  175
  • Reputation:   14
  • Joined:  11/21/11
  • Last Seen:  

should i use the md5 password or just stick to plain one?

because i think md5 is easy to crack and it doesn't matter if i hash my password.

Link to comment
Share on other sites

23 answers to this question

Recommended Posts


  • Group:  Members
  • Topic Count:  48
  • Topics Per Day:  0.01
  • Content Count:  410
  • Reputation:   29
  • Joined:  04/04/12
  • Last Seen:  

If MD5 is easy to crack, tell me what this password is.

d16725300976db1641d4663d9c13a9e2

But in all seriousness, you should hash your passwords. There's no reason not to, and it keeps amateurs from messing with your server.

Edited by michaelsoftman
Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  47
  • Topics Per Day:  0.01
  • Content Count:  175
  • Reputation:   14
  • Joined:  11/21/11
  • Last Seen:  

If MD5 is easy to crack, tell me what this password is.

d16725300976db1641d4663d9c13a9e2

But in all seriousness, you should hash your passwords. There's no reason not to, and it keeps amateurs from messing with your server.

i hate you too.

i guess so yeah.

but is it possible to use different hash?

Edited by Feefty
Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  26
  • Topics Per Day:  0.01
  • Content Count:  331
  • Reputation:   63
  • Joined:  11/29/11
  • Last Seen:  

If MD5 is easy to crack, tell me what this password is.

d16725300976db1641d4663d9c13a9e2

But in all seriousness, you should hash your passwords. There's no reason not to, and it keeps amateurs from messing with your server.

If MD5 is easy to crack, tell me what this password is.

d16725300976db1641d4663d9c13a9e2

But in all seriousness, you should hash your passwords. There's no reason not to, and it keeps amateurs from messing with your server.

i hate you too.

i guess so yeah.

but is it possible to use different hash?

Its "I hate you."

not "i hate you too."

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  81
  • Topics Per Day:  0.02
  • Content Count:  1654
  • Reputation:   583
  • Joined:  08/09/12
  • Last Seen:  

If MD5 is easy to crack, tell me what this password is.

I hate you. /omg

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  47
  • Topics Per Day:  0.01
  • Content Count:  175
  • Reputation:   14
  • Joined:  11/21/11
  • Last Seen:  

If MD5 is easy to crack, tell me what this password is.

d16725300976db1641d4663d9c13a9e2

But in all seriousness, you should hash your passwords. There's no reason not to, and it keeps amateurs from messing with your server.

If MD5 is easy to crack, tell me what this password is.

d16725300976db1641d4663d9c13a9e2

But in all seriousness, you should hash your passwords. There's no reason not to, and it keeps amateurs from messing with your server.

i hate you too.

i guess so yeah.

but is it possible to use different hash?

Its "I hate you."

not "i hate you too."

lol. i know, im just saying i hate him too.

Edited by Feefty
Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  48
  • Topics Per Day:  0.01
  • Content Count:  410
  • Reputation:   29
  • Joined:  04/04/12
  • Last Seen:  

Haha, I feel the love in this thread. <3

Seriously though. Hashing it can keep some people from doing anything if they somehow gain access to your login DB. But then again, if you just focus DB security instead, that would be the better option. There's no real reason not to MD5 them though.

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  94
  • Topics Per Day:  0.02
  • Content Count:  2192
  • Reputation:   252
  • Joined:  11/11/11
  • Last Seen:  

Guys, keep on track with the topic... few replies without even constructive feedback.

As for good security, as mentioned above, MD5 isn't always the best.. yes, it's good when it comes to people who can't crack it, but people who can crack can obviously get around it. Another way is to make sure you do not use easy guessed passwords for your different databases etc. Getting hashed passwords is also beneficial. You as an owner will always want to take necessary precautions to protect your server (well, you should).

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  16
  • Topics Per Day:  0.00
  • Content Count:  737
  • Reputation:   216
  • Joined:  11/29/11
  • Last Seen:  

well md5 is easy to crack when you use real world as password since it's already in dictionary but just try with some number in it and it'll get way more complicate like :

6ffe7c349a183a182671f828d786d137

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  94
  • Topics Per Day:  0.02
  • Content Count:  2192
  • Reputation:   252
  • Joined:  11/11/11
  • Last Seen:  

well md5 is easy to crack when you use real world as password since it's already in dictionary but just try with some number in it and it'll get way more complicate like :

6ffe7c349a183a182671f828d786d137

Ahh. I've personally never used MD5 in my servers so I haven't really experienced it working all I knew that it added a tad more security.

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  26
  • Topics Per Day:  0.01
  • Content Count:  331
  • Reputation:   63
  • Joined:  11/29/11
  • Last Seen:  

well md5 is easy to crack when you use real world as password since it's already in dictionary but just try with some number in it and it'll get way more complicate like :

6ffe7c349a183a182671f828d786d137

+1

If there's much complicated password in md5, its very less percent chance to crack it down,

BUT,

Often Players use easy passwords.

No Player would input hard/long passwords for logging in server everyday.

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  94
  • Topics Per Day:  0.02
  • Content Count:  2192
  • Reputation:   252
  • Joined:  11/11/11
  • Last Seen:  

well md5 is easy to crack when you use real world as password since it's already in dictionary but just try with some number in it and it'll get way more complicate like :

6ffe7c349a183a182671f828d786d137

+1

If there's much complicated password in md5, its very less percent chance to crack it down,

BUT,

Often Players use easy passwords.

No Player would input hard/long passwords for logging in server everyday.

Well then, wouldn't that be their fault then? :P If they get hacked, it'd be their fault but then complain to the Admin :P

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  26
  • Topics Per Day:  0.01
  • Content Count:  331
  • Reputation:   63
  • Joined:  11/29/11
  • Last Seen:  

well md5 is easy to crack when you use real world as password since it's already in dictionary but just try with some number in it and it'll get way more complicate like :

6ffe7c349a183a182671f828d786d137

+1

If there's much complicated password in md5, its very less percent chance to crack it down,

BUT,

Often Players use easy passwords.

No Player would input hard/long passwords for logging in server everyday.

Well then, wouldn't that be their fault then? :P If they get hacked, it'd be their fault but then complain to the Admin :P

But they don't understand its their own fault.

But As I Think,

Its admin fault also for low security of the databases.

Keep very hard passwords for vps and sql, and ddos protected, and then its no chance to get hacked.

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  11
  • Topics Per Day:  0.00
  • Content Count:  57
  • Reputation:   0
  • Joined:  09/13/12
  • Last Seen:  

yes just convert the default has to other has since its on the db, so i think yes

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  16
  • Topics Per Day:  0.00
  • Content Count:  737
  • Reputation:   216
  • Joined:  11/29/11
  • Last Seen:  

You could change your registration form to require some number in it or thing like that, (that what they usually do, you're pass is too weak, you're pass require 3 number etc...)

Otherwise you could always rehash pass by a configured sel. I think I'll do a diff for that.

This will probably lower encryption as I didn't study the redundancy etc but if you looking at it I doubt you'll have someone who really gonna writte something to crack your encryption, most of time it's script kiddy that use md5 decrypt site to found pass.

And as I said those site work with dictionary, they have a hash of md5 keys corresponding to with pass and there you go, so if you're pass it's not common have weird letter in it etc it's probably not referenced yet.

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  9
  • Topics Per Day:  0.00
  • Content Count:  379
  • Reputation:   304
  • Joined:  11/10/11
  • Last Seen:  

Otherwise you could always rehash pass by a configured sel.

Agree, it's the easer way to ""secure"" all passwords without changing/adding a lot of code, this is what I used in the past.

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  81
  • Topics Per Day:  0.02
  • Content Count:  1654
  • Reputation:   583
  • Joined:  08/09/12
  • Last Seen:  

Add more salt please ;)

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  16
  • Topics Per Day:  0.00
  • Content Count:  737
  • Reputation:   216
  • Joined:  11/29/11
  • Last Seen:  

Here try this for a quick salt, not exactly what I was using but should be easier like that, ofc you can make it harder if you wish :

http://upaste.me/04d51583d10fd52c

Don't forget to change the passphrase otherwise won't be that usefull.

Also you'll need to change new account creation insert in db for :

"insert into login(user_pass) values( md5(concat(inputpasswd,mypasskey)) ); "

yes that an incomplete sql query for registration but it's just to show password change in registration.

To update you db it'll be

update login set user_pass= md5(concat(user_pass,mypasskey); //well this assume you didn't had md5 enable yet

and ofc after this you'll need to enable md5. if you already had it enable I'm afraid I don't have a generic solution unless you may try to decrypt all md5 first but I'd not recommend it, better to ask user to renew their pass

  • Upvote 1
Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  47
  • Topics Per Day:  0.01
  • Content Count:  175
  • Reputation:   14
  • Joined:  11/21/11
  • Last Seen:  

Here try this for a quick salt, not exactly what I was using but should be easier like that, ofc you can make it harder if you wish :

http://upaste.me/04d51583d10fd52c

Don't forget to change the passphrase otherwise won't be that usefull.

Also you'll need to change new account creation insert in db for :

"insert into login(user_pass) values( md5(concat(inputpasswd,mypasskey)) ); "

yes that an incomplete sql query for registration but it's just to show password change in registration.

To update you db it'll be

update login set user_pass= md5(concat(user_pass,mypasskey); //well this assume you didn't had md5 enable yet

and ofc after this you'll need to enable md5. if you already had it enable I'm afraid I don't have a generic solution unless you may try to decrypt all md5 first but I'd not recommend it, better to ask user to renew their pass

thanks, ill try this.

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  9
  • Topics Per Day:  0.00
  • Content Count:  554
  • Reputation:   70
  • Joined:  04/04/12
  • Last Seen:  

Here try this for a quick salt, not exactly what I was using but should be easier like that, ofc you can make it harder if you wish :

http://upaste.me/04d51583d10fd52c

Don't forget to change the passphrase otherwise won't be that usefull.

Also you'll need to change new account creation insert in db for :

"insert into login(user_pass) values( md5(concat(inputpasswd,mypasskey)) ); "

yes that an incomplete sql query for registration but it's just to show password change in registration.

To update you db it'll be

update login set user_pass= md5(concat(user_pass,mypasskey); //well this assume you didn't had md5 enable yet

and ofc after this you'll need to enable md5. if you already had it enable I'm afraid I don't have a generic solution unless you may try to decrypt all md5 first but I'd not recommend it, better to ask user to renew their pass

this is not effective since the additional security encryption is done in server side and not in the client side..

traditional way :

client(hashed) --[pass:test]-->server-->[check db]-->(success/fail)

I'm hacker I get this †

(boom I know your pass)

+salt

client(hashed) --[pass:test]-->server-->[check db+salt]-->(success/fail)

I'm hacker I get this †

(boom I also know your pass)

anyway this is useful if the attacker/hacker is in the server side..:)

:meow:

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  9
  • Topics Per Day:  0.00
  • Content Count:  379
  • Reputation:   304
  • Joined:  11/10/11
  • Last Seen:  

this is not effective since the additional security encryption is done in server side and not in the client side..

traditional way :

client(hashed) --[pass:test]-->server-->[check db]-->(success/fail)

I'm hacker I get this †

(boom I know your pass)

+salt

client(hashed) --[pass:test]-->server-->[check db+salt]-->(success/fail)

I'm hacker I get this †

(boom I also know your pass)

anyway this is useful if the attacker/hacker is in the server side..:)

:meow:

I don't get it.

A hash is a hash, you can't reverse it you have to brute force all possibles combinations to have it.

Even if the hacker know the key, if it's a complicate key you will not be able to reverse the hash without testing all possibilities.

And yeah it's useful only if the attacker/hacker own an access to the server (even if in this case, there are other ways to get passwords).

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  9
  • Topics Per Day:  0.00
  • Content Count:  554
  • Reputation:   70
  • Joined:  04/04/12
  • Last Seen:  

I don't get it.

A hash is a hash, you can't reverse it you have to brute force all possibles combinations to have it.

hahaha..I mean if the password used is in the dictionary cause I'm basing my example on the password given at later post..and I also stated there "pass:test"

:meow:

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  9
  • Topics Per Day:  0.00
  • Content Count:  379
  • Reputation:   304
  • Joined:  11/10/11
  • Last Seen:  

Ok I now understand the "pass:test" thing lol, of course the secret key have to be strong :P

Link to comment
Share on other sites


  • Group:  Members
  • Topic Count:  32
  • Topics Per Day:  0.01
  • Content Count:  247
  • Reputation:   207
  • Joined:  10/23/12
  • Last Seen:  

Well there are the <passwordencrypt> and <passwordencrypt2> clientinfo functions which I haven't delved extremely deep into but I see that they are supported (at least there are checks) on the server side. I believe that is what malufett was referring to in the previous post was that the client generally sends password plaintext. Sending a password plaintext is not a good thing.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Answer this question...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...