yeh Im sure lol just pointing the guy at something easy to generate an sql for him
(ps yeh if you wanna use the password hashing portion on a register page by changing to form i reccomend you "at very least" change the hash a little bit to different random numbers)
its actually a lot easier to write now
no point in wasting the time for it for something like this though
heres a couple of different md5+salt combinations if you want
that script has been around well well before the revo database fyi.
slightly changed html around it, but the salted MD5 (the bit that actually matters) is the same.
yeh so true though heh
Quote:
Originally Posted by PowerChaos
if i am not wrong
there is only 1 md5 algorytme that works for eo to login
exept if you change the algorytme also in the account server/login screen
Greetings From PowerChaos
well yes of course you have to change some things to make new things work
End of the day, your better off working on packet encryption before changing salts which should be behind a secured firewall.
heh yeh just pointing out that it 'could' be done not that it needs to
and yes securing your server is the first priority as they would have to get past that to get to the database to begin with
packet encryption is an even more daunting task than hash codes for most people though lol
first they would have to learn what packets are and how theyre used to be able to even start
Considering if you can't even set your firewall correctly, and set MySQL up to survive twats trying to "hack" you, a server alone should be the backburner really.
Call it harsh, but I strongly believe server owners should have a sound knowledge of what I'd happening in the background.
How does one correctly diagnose a fault if they don't know what they are talking about?
This is the extent you should be at if your looking to change hashes.
But once again, if your ay the stage of doing that, one would hope it's not just a stopgap mesure to insecurity.
Never actually made the connection that it was ripped directly from tq.
Would have assumed they would have attempted to change it a little at this point.
IIRC there is a thread about changing the salt, but it's not an easy task.
End of the day, your better off working on packet encryption before changing salts which should be behind a secured firewall.
why would TQ change there md5 hash in first place ?
any idea how mutch updates they need to perform to change all the md5 passwords to "new" passwords ?
and if i am not wrong , they dit it before ( reason why a lot of accounts where logged in into some one else account -> caused a rollback of the db )
then for package encryption
unless you know where it is used for is it useless to apply them (every noob can sniff out packages those days with wireshark or backtrack ? )
also some things are just overrated , they look like they can generate a appocalypse but in reality is it a differend story
reason of encryption ? to prevent data theft if they get the db , not to prevent hackers from guessing your pass ( as md5 can not be reversed so it is still a safe way of encryption)
so if you do packet sniffing and get the return value's , you are still missing the real hash/pass from the package as it just return 1 or 0
so what reason do they have then to change there system ? or to change the md5 algorithm when it provide more trouble then it is worth
also for security , it depends who is in charge of the security and about what layer you are talking
firewall and client side stuff is for the client , but there are a lot more things behind that part that clients does not know about
so you can not blame the client if they do not have those knowledge (like ADDC , only who use it knows what it can do -> vps providers for example )
eather way , to stay on topic
if he want a easy solution then use my script on
he only need to fix the small bug in it , solution is here on the forum ( i still dit not got time to fix it , easy fix , just replace a variable to a other file )
What I meant by my coments is I'm surprised tq still process the md5 on the clients side.
When talking firewalls and security, I'm talking application level settings in MySQL (hostmark ip limiting, access limitations. ) and at layer 4, in terms of limiting the port being open to anymore addresses than needed.
I like to keep my position in datacenters and hosting seperate from wo threads myself. Generally you end up getting too technical otherwise.
By no part was I suggesting the user should be imposing limitations outside of their reach.
My expectations with packets come down to, by the point of understanding packets, you really do learn an underlining for how the system works in full.
Maybe my points slightly missed their mark - using phone right now and can't really reread post. But you got the wrong end of what I was getting at...
Considering if you can't even set your firewall correctly, and set MySQL up to survive twats trying to "hack" you, a server alone should be the backburner really.
Call it harsh, but I strongly believe server owners should have a sound knowledge of what I'd happening in the background.
How does one correctly diagnose a fault if they don't know what they are talking about?
This is the extent you should be at if your looking to change hashes.
But once again, if your at the stage of doing that, one would hope it's not just a stopgap mesure to insecurity.
lol an outside threat is one thing and yeh its not likely that people will get your stuff from the outside
but password hashes and local permissions etc are important as well to keep the people you work with honest although I doubt many would have the knowledge to decrypt them a few around here might though
Quote:
Originally Posted by hio77
What I meant by my coments is I'm surprised tq still process the md5 on the clients side.
When talking firewalls and security, I'm talking application level settings in MySQL (hostmark ip limiting, access limitations. ) and at layer 4, in terms of limiting the port being open to anymore addresses than needed.
I like to keep my position in datacenters and hosting seperate from wo threads myself. Generally you end up getting too technical otherwise.
By no part was I suggesting the user should be imposing limitations outside of their reach.
My expectations with packets come down to, by the point of understanding packets, you really do learn an underlining for how the system works in full.
Maybe my points slightly missed their mark - using phone right now and can't really reread post. But you got the wrong end of what I was getting at...
yeh this thread is getting rather technical and off topic isnt it lol
How create a trainer in cheat engine, and how to create autoassemble scripts [16 June 06/17/2012 - Facebook - 3 Replies Many people asked me that...
Maybe some of these people are from here.. or maybe not..
Anyway.. heres 25 minutes video ;D which should help?
How create a trainer in cheat engine, and how to create autoassemble scripts - YouTube
And yea..
I noticed that there 360p and 720p only.. no idea where the 460p gone... :x
put 720p and full screen, otherwise in normal size its looks crappy