-
September 1st, 2008, 07:14 AM
#11
Originally Posted by boyboy400
1-In my first question above, when we know that there had been a challenge/responce, does it mean that the hash of password is manipulated with some string? I mean for example if the pass had been 123 and its hash mush be abcdef, yahoo added a string to it and what we have is: "hash=xyzabcdef"? Am I right?
Sounds about right.
2- Was I right about the wireshark? I mean does it have sniffed the hash of his own password (not the hash of someone else)? Because apparently it sniffs the packages(being sent and received) of the computer it's installed on!!
It sure looks that way.
I'm an atheist. God is overrated.
Oliver's Law:
Experience is something you don't get until just after you need it.
-
September 1st, 2008, 07:29 AM
#12
-
September 1st, 2008, 08:10 AM
#13
Originally Posted by The-Spec
That's a nice toy gun.
-
September 1st, 2008, 08:27 PM
#14
Similar Threads
-
By cheyenne1212 in forum Miscellaneous Security Discussions
Replies: 7
Last Post: February 1st, 2012, 02:51 PM
-
By qod in forum The Security Tutorials Forum
Replies: 6
Last Post: February 27th, 2004, 03:03 AM
-
By don in forum The Security Tutorials Forum
Replies: 9
Last Post: January 8th, 2003, 02:40 PM
-
By Noble Hamlet in forum AntiOnline's General Chit Chat
Replies: 1100
Last Post: March 17th, 2002, 09:38 AM
-
By antihaxor in forum Non-Security Archives
Replies: 0
Last Post: January 24th, 2002, 05:42 PM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|