[Request]MySQL password decrypter/encrypter

09/09/2008 16:24 ~Yuki~#1
Yo i was wondering if someone could make a MySQL password decrypter/encrypter for me...
I would need it to set new passwords for my users on my forum and my server.

Regarts,

Juki
09/09/2008 16:50 MushyPeas#2
Quote:
Originally Posted by lolmaster123 View Post
Yo i was wondering if someone could make a MySQL password decrypter/encrypter for me...
I would need it to set new passwords for my users on my forum and my server.

Regarts,

Juki
I would assume they are stored in a non-reversable encryption like md5 / sha-1 so making new passes would be a piece of cake but decrypting them an impossible task.
09/09/2008 17:24 ~Yuki~#3
crap... thx...
09/09/2008 20:49 Heddskott#4
Quote:
Originally Posted by lolmaster123 View Post
Yo i was wondering if someone could make a MySQL password decrypter/encrypter for me...
I would need it to set new passwords for my users on my forum and my server.

Regarts,

Juki
Just get some nice rainbows tables and you will be able to "crack" it within 1 week. MySQL password are stored as "MySQL" passwords. They are shown as "Username", "Hash", and challenge at some points.
09/09/2008 21:42 ~Yuki~#5
Quote:
Originally Posted by Heddskott View Post
Just get some nice rainbows tables and you will be able to "crack" it within 1 week. MySQL password are stored as "MySQL" passwords. They are shown as "Username", "Hash", and challenge at some points.
Hacker....xD

i already found a way to de/encrypt^^
09/11/2008 10:28 ChingChong23#6
... MD5 and SHA1 are reversible, how do you think the server handles the password? lol.
09/11/2008 13:08 unknownone#7
MD5 and SHA1 are destructive hashes, they're not rversable. Of course, they are crackable by brute force, if you have a spare zombie-net, or a supercomputer at hand. Feasibly though, you're never gonna crack them.

How does a server handle a password? Simple - it stores the password as a hash, and each time the user logs in, the password they enter is hashed and compared against the the stored hash.

Now, Official CO servers actually store passwords as plain text (dumb yes). Anyone who has made a private server that doesn't hash passwords is equally idiotic. The password encryption used on the CO protocol for sending it to server is reversable though.
09/12/2008 13:19 MushyPeas#8
Quote:
Originally Posted by ChingChong23 View Post
... MD5 and SHA1 are reversible, how do you think the server handles the password? lol.
Another one for my sig.. lol...
09/13/2008 15:30 NovaCygni#9
Quote:
Originally Posted by MushyPeas View Post
Another one for my sig.. lol...
MD5 Is crackable from what Ive read (* Though havnt tried so I may be wrong *) the SHA1 on the other hand... lol....
*also, doesnt even leavemealone say MD5 isnt hard to decrypt... in your siggy with the link to the Underground (* :rolleyes: :p *) Or shucks is that just a "bait" link :o
09/13/2008 15:43 unknownone#10
They can't be "decrypted" as such. The hash destroys the original information. The only way to crack hashed passwords is to use a brute force attack, either a dictionary, or random pass generator where every entry is hashed and compared against the original. There's little difference between cracking SHA-1 and MD5 in that case, but as I mentioned, cracking say, 8 character alpahnumeric passwords can take forever, but some people have databases, where every possible hash for an md5 of say, 8 character alohanumeric characters is stored, and it's much quicker to look up the hash in the database than to try and crack it with an alogorithm.
09/13/2008 18:32 MushyPeas#11
09/14/2008 21:34 Ian*#12
Quote:
Originally Posted by MushyPeas View Post
Please don't throw rainbow tables at me :X