Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: T Biehn (tbiehngmail.com)
Date: Mon Aug 10 2009 - 11:13:06 CDT
I'm flattered; If you only knew what it was for...
On Mon, Aug 10, 2009 at 12:08 PM, <antisechushmail.com> wrote:
> AntiSec would like to approach you by telling you to keep you
> whitehat filty ass off our list, Travis.
> Have a nice day sucking off Aitel.
> On Sun, 09 Aug 2009 20:14:57 -0400 T Biehn <tbiehngmail.com> wrote:
>>Soliciting random suggestions.
>>Lets say I have data to one-way-hash.
>>The set has 9,999,999,999 members.
>>It's relatively easy to brute force this, or create precomp
>>So you add a salt to each.
>>Still easy to brute force.
>>If you were to create it in such a way that the hash could exist
>>anywhere in the set member, does this increase the cost of
>>That is, consider a member 'abcdefg' with salt 329938255.
>>When authenticating against the server, it must permute over all
>>possible combinations of the salt and the set member in order to
>>determine the validity of the password.
>>If anyone has a better approach, or would like to approach me off
>>list, or knows of a list more suited to these queries please feel
>>to redirect me :)
>>Full-Disclosure - We believe in it.
>>Hosted and sponsored by Secunia - http://secunia.com/
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/