Doctor Blade
Well-Known Member
Ah, that's what I missed. I'll blame the early cold morning and let it go at that. I don't use that particular combination of username/password everywhere, thankfully.
They were posted on /b/.
Torrent on a popular site. Full site rip. If you can't find it, you don't deserve to
Is that place the Voldemort of the Internet? No one dare speak its name?4chon
I thought the whole point of a hash was that it's unique, and in this case only points to one password? How else could you get it to work?
Unless you're talking about MD5 (and probably a few others) where you can get the same hash for something different, but that isn't the intended use and the reason why MD5 should be viewed as cracked/unsafe. I don't think DES has that problem?
I'd like to figure out what password was associated with my gawker account. Have downloaded the full_db file. Can you please provide specific instructions for how to decrypt the encrypted password (using php if possible). I am not that familiar with hashes and don't completely follow the discussion in this thread. Specific instructions would be helpful (PM me if you'd rather not publish the instructions publicly-- though you'd have to trust I wouldn't.
I just want to decrypt my own password so I know which one to worry about. Thank you.
I used to have a little text file full of passwords (several dozen completely cryptic ones) on a USB stick that I guarded very jealously. That is, until the day I forgot it plugged into one of the many public computers at uni. I noticed my mistake late in the evening, changed all my passwords and went to the computer hall first thing in the morning - the stick was still there, probably due to it being an ancient 256 MB model whose case keeps falling apart. It was still nice to see that sometimes, a forgotten item may actually not be taken immediately by someone else.Just change all of them.
Oh, the stick was emptied as soon as I had it back. Better to be safe than sorry. I now have that file and a couple others in an encrypted .dmg on my laptop. I figured that if I lose my laptop, I'm royally screwed anyway, so if some inaccessible personal info is lost along with it, it won't add to my worries.You should encrypt that text file. Even if the password is something unsafe as your first name to make sure you never forget it, that's massively better than plain text.
blablabla
This isn't going to happen, if only becauseI'd like to figure out what password was associated with my gawker account.
I am not that familiar with hashes and don't completely follow the discussion in this thread.
Ignoring the actual algorithm used, a cryptographic hash function turns some input into a fixed-size bit string. In other words, it maps an infinite number of inputs onto a finite number of outputs - two to the power of size, for a 128bit hash it would be 2^128 or 3.4*10^38 values. As a necessary implication there is an infinitely large number of input values that maps to a single output value.
If they used any hash method then there will be collisions.
I've been in the IRC channel and just reading the forums. You've got waaay too many postsbone said:kip!!! where have you been? i think it's been ages since i last saw you post here?
Very interesting, I've never thought about it in that way.
In this case with DES they only used the first 8 characters of the password though, and then you have enough possible hashes to cover all the possible inputs, or am i mistaken?
I assume finding the same output hash for different inputs is just as hard as finding the orginal input text then (if the hash method isn't broken)?
I've been in the IRC channel and just reading the forums. You've got waaay too many posts