Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
Re: Craking Serv-u passwords stored in .ini file.

From: Marius Huse Jacobsen (mahujac2i.net)
Date: Thu Sep 09 2004 - 11:03:02 CDT

Hash: SHA1

Hello Hans,

Thursday, September 2, 2004, 10:44:23 PM, you wrote:
HP> Actually, the http://passcracking.com site will crack MD5 hashes using
HP> rainbow tables, but they are non-salted, as salted MD5 is too
HP> difficult for precomputation attacks (for now).

I can feed them the salted MD5, just removing the salt pre/post-fix.
Imagine the password "me" and the salt "ab". In such a case, such a
lookup would return "abme" as the password. I know the "ab" is the
salt, so I remove it, and I have the "me" password.

In other words, as long as it's not input to the hash algo in a
different way, just added to the password before being sent to the
hasher, these tables will be able to look them up - today.

However, if there's a limit of 8 characters, then it's 8 - saltsize
that becomes the new 'max size password' that those tables can look up
for you.

This presumes, of course, that the salt characters are part of the
character set that are used for creating the tables in the first

- --
Best regards,
 Marius mailto:mahujac2i.net
Version: GnuPG v1.2.5 (MingW32)


Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.