Page 3 of 3 FirstFirst 123
Results 21 to 23 of 23

Thread: Password Cracking with Rainbow Tables

  1. #21
    Senior Member
    Join Date
    Sep 2003
    Posts
    126
    very nice tut one of the best I've read here.
    I think every admin should be taking a deeper look into this soon to be nightmare.
    [Shadow] have you ever noticed work is like a tree full of monkeys you look down and all you see is monkeys below you then you look up and all you see is a bunch of *******s above[/shadow]

  2. #22
    Antionline Herpetologist
    Join Date
    Aug 2001
    Posts
    1,165
    As someone already said, this is only really usable on Windows which generates the same hash for a particular password across systems. However, on *NIX systems, a "salt" value is added before hashing the password. This prevents the same hash from (technically) ever being generated for that password. So, rainbowcrack and the like are useless unless you know the salt.

    Cheers,
    cgkanchi
    Buy the Snakes of India book, support research and education (sorry the website has been discontinued)
    My blog: http://biology000.blogspot.com

  3. #23
    Junior Member
    Join Date
    May 2004
    Posts
    4
    hey, just wanted to let you know, aside from this being an incredibly interesting read, this is actually the first thread i saw on this forum (i'm an AO n00b). thanks for the great info, i've been reading the text you linked to (all 38 pages worth), learning a lot of things i never knew until yesterday! i've definitely been wanting to get my hands wet with some new security info as such, so this is a good way for me to begin. thanks again

    -D

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •