Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Am I right or am I right?

Am I right or am I right?

Scheduled Pinned Locked Moved The Lounge
questioncryptographyhelptutorialannouncement
34 Posts 17 Posters 5 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • X Offline
    X Offline
    xiecsuk
    wrote on last edited by
    #1

    I have been fretting over the question of hacked userids/passwords. As I understand it, the stolen password is not actually the password but a hashed version of it which the hacker then decodes by brute force and ignorance to arrive at the actual password. But what if that wasn't the actual password. What if the system I was using performed some sort of transformation before it hashed the password for storage. For example, when I log on to my account, I type in pass123 as my password, but unbeknown to me, the system translates that to 321ssap, hashes it and stores it. The hacker tries to log onto my userid and types in 321ssap as my password which is what he thinks it is. This gets translated to 123pass and hashed for checking. But that hash value is not the same as the one that is stored. Therefore an "Incorrect password" error message is generated. Am I missing something here?

    Kornfeld Eliyahu PeterK N L D A 9 Replies Last reply
    0
    • X xiecsuk

      I have been fretting over the question of hacked userids/passwords. As I understand it, the stolen password is not actually the password but a hashed version of it which the hacker then decodes by brute force and ignorance to arrive at the actual password. But what if that wasn't the actual password. What if the system I was using performed some sort of transformation before it hashed the password for storage. For example, when I log on to my account, I type in pass123 as my password, but unbeknown to me, the system translates that to 321ssap, hashes it and stores it. The hacker tries to log onto my userid and types in 321ssap as my password which is what he thinks it is. This gets translated to 123pass and hashed for checking. But that hash value is not the same as the one that is stored. Therefore an "Incorrect password" error message is generated. Am I missing something here?

      Kornfeld Eliyahu PeterK Offline
      Kornfeld Eliyahu PeterK Offline
      Kornfeld Eliyahu Peter
      wrote on last edited by
      #2

      xiecsuk wrote:

      As I understand it, the stolen password is not actually the password but a hashed version of it

      In most cases, lately reported over media, it was plain text... :((

      Skipper: We'll fix it. Alex: Fix it? How you gonna fix this? Skipper: Grit, spit and a whole lotta duct tape.

      "It never ceases to amaze me that a spacecraft launched in 1977 can be fixed remotely from Earth." ― Brian Cox

      N D Richard DeemingR 3 Replies Last reply
      0
      • X xiecsuk

        I have been fretting over the question of hacked userids/passwords. As I understand it, the stolen password is not actually the password but a hashed version of it which the hacker then decodes by brute force and ignorance to arrive at the actual password. But what if that wasn't the actual password. What if the system I was using performed some sort of transformation before it hashed the password for storage. For example, when I log on to my account, I type in pass123 as my password, but unbeknown to me, the system translates that to 321ssap, hashes it and stores it. The hacker tries to log onto my userid and types in 321ssap as my password which is what he thinks it is. This gets translated to 123pass and hashed for checking. But that hash value is not the same as the one that is stored. Therefore an "Incorrect password" error message is generated. Am I missing something here?

        N Offline
        N Offline
        Nagy Vilmos
        wrote on last edited by
        #3

        Wrong. The hacker would need to know what hash is being employed to perform an attack and would, most probably have had their own user set up as a known value to check their attack. So maybe they'd see past the subterfuge. Or maybe someone else is wrong.

        veni bibi saltavi

        1 Reply Last reply
        0
        • Kornfeld Eliyahu PeterK Kornfeld Eliyahu Peter

          xiecsuk wrote:

          As I understand it, the stolen password is not actually the password but a hashed version of it

          In most cases, lately reported over media, it was plain text... :((

          Skipper: We'll fix it. Alex: Fix it? How you gonna fix this? Skipper: Grit, spit and a whole lotta duct tape.

          N Offline
          N Offline
          Nagy Vilmos
          wrote on last edited by
          #4

          No one would be that would they, not now... [sarcasm icon not needed]

          veni bibi saltavi

          OriginalGriffO 1 Reply Last reply
          0
          • X xiecsuk

            I have been fretting over the question of hacked userids/passwords. As I understand it, the stolen password is not actually the password but a hashed version of it which the hacker then decodes by brute force and ignorance to arrive at the actual password. But what if that wasn't the actual password. What if the system I was using performed some sort of transformation before it hashed the password for storage. For example, when I log on to my account, I type in pass123 as my password, but unbeknown to me, the system translates that to 321ssap, hashes it and stores it. The hacker tries to log onto my userid and types in 321ssap as my password which is what he thinks it is. This gets translated to 123pass and hashed for checking. But that hash value is not the same as the one that is stored. Therefore an "Incorrect password" error message is generated. Am I missing something here?

            L Offline
            L Offline
            Lost User
            wrote on last edited by
            #5

            Also easier to prevent by including some salt, as already discussed quite some times. Companies ain't gonna spend money if it is not required, and people cannot enter the database, so why not store it as plain text?

            Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^]

            1 Reply Last reply
            0
            • X xiecsuk

              I have been fretting over the question of hacked userids/passwords. As I understand it, the stolen password is not actually the password but a hashed version of it which the hacker then decodes by brute force and ignorance to arrive at the actual password. But what if that wasn't the actual password. What if the system I was using performed some sort of transformation before it hashed the password for storage. For example, when I log on to my account, I type in pass123 as my password, but unbeknown to me, the system translates that to 321ssap, hashes it and stores it. The hacker tries to log onto my userid and types in 321ssap as my password which is what he thinks it is. This gets translated to 123pass and hashed for checking. But that hash value is not the same as the one that is stored. Therefore an "Incorrect password" error message is generated. Am I missing something here?

              D Offline
              D Offline
              den2k88
              wrote on last edited by
              #6

              The password is (shuold be) never sent in any form to the server, normally the authentication is a challenge based one. In phase of registration there is a secure connection where you actually send your password to the server. Then the login is done by challenge: the server creates a chunk of random data Ri, sends them to the client and at the same time encrypts them using the hash of the password it has stored, creating the encrypted challenge Ci. The client receives Ri and encrypts using the hash of the provided password, then sends the encrypted chunk Cj to the server. The server then compares Ci and Cj - if they're equal then the loign is successful. The main reason because the password should never be sent in any form is to protect from Man In The Middle attacks: if an attacker can sniff your login packet then it may send it again on later times, sending the encrypted password directly to the server with a custom made login packet.

              Geek code v 3.12 GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- r++>+++ y+++* Weapons extension: ma- k++ F+2 X // No comment

              1 Reply Last reply
              0
              • N Nagy Vilmos

                No one would be that would they, not now... [sarcasm icon not needed]

                veni bibi saltavi

                OriginalGriffO Offline
                OriginalGriffO Offline
                OriginalGriff
                wrote on last edited by
                #7

                Obligatory CommitStrip[^]

                Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

                "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
                "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

                N 1 Reply Last reply
                0
                • Kornfeld Eliyahu PeterK Kornfeld Eliyahu Peter

                  xiecsuk wrote:

                  As I understand it, the stolen password is not actually the password but a hashed version of it

                  In most cases, lately reported over media, it was plain text... :((

                  Skipper: We'll fix it. Alex: Fix it? How you gonna fix this? Skipper: Grit, spit and a whole lotta duct tape.

                  D Offline
                  D Offline
                  den2k88
                  wrote on last edited by
                  #8

                  Seriously, my (mandatory) car insurance company sent me the current password in plain text when I clicked on "forgot my password" (turned out I didn't forget my password, they simply changed the accepted character set for the passwords between my logins so my password wasn't valid but I couldn't log in to change it. Had to spend 3 days on the phone and threaten them with Hell, Damnation and going to another company). That means either my password was stored in clear text or it was sotred in such a way that it was recoverable. That is BAD.

                  Geek code v 3.12 GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- r++>+++ y+++* Weapons extension: ma- k++ F+2 X // No comment

                  Kornfeld Eliyahu PeterK OriginalGriffO 2 Replies Last reply
                  0
                  • OriginalGriffO OriginalGriff

                    Obligatory CommitStrip[^]

                    Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

                    N Offline
                    N Offline
                    Nagy Vilmos
                    wrote on last edited by
                    #9

                    that

                    veni bibi saltavi

                    1 Reply Last reply
                    0
                    • X xiecsuk

                      I have been fretting over the question of hacked userids/passwords. As I understand it, the stolen password is not actually the password but a hashed version of it which the hacker then decodes by brute force and ignorance to arrive at the actual password. But what if that wasn't the actual password. What if the system I was using performed some sort of transformation before it hashed the password for storage. For example, when I log on to my account, I type in pass123 as my password, but unbeknown to me, the system translates that to 321ssap, hashes it and stores it. The hacker tries to log onto my userid and types in 321ssap as my password which is what he thinks it is. This gets translated to 123pass and hashed for checking. But that hash value is not the same as the one that is stored. Therefore an "Incorrect password" error message is generated. Am I missing something here?

                      A Offline
                      A Offline
                      amagitech
                      wrote on last edited by
                      #10

                      I am mathematican.And my english isn't good. So sorry if I fail to make oneself understood. I have studied cryptology for a little while. I can say that: Hash code's inverse functions's solutions calculates forever.

                      OriginalGriffO D 2 Replies Last reply
                      0
                      • D den2k88

                        Seriously, my (mandatory) car insurance company sent me the current password in plain text when I clicked on "forgot my password" (turned out I didn't forget my password, they simply changed the accepted character set for the passwords between my logins so my password wasn't valid but I couldn't log in to change it. Had to spend 3 days on the phone and threaten them with Hell, Damnation and going to another company). That means either my password was stored in clear text or it was sotred in such a way that it was recoverable. That is BAD.

                        Geek code v 3.12 GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- r++>+++ y+++* Weapons extension: ma- k++ F+2 X // No comment

                        Kornfeld Eliyahu PeterK Offline
                        Kornfeld Eliyahu PeterK Offline
                        Kornfeld Eliyahu Peter
                        wrote on last edited by
                        #11

                        Relax - it was no trouble to retrieve your password...It was stored as plain text to avoid any future problem :laugh:

                        Skipper: We'll fix it. Alex: Fix it? How you gonna fix this? Skipper: Grit, spit and a whole lotta duct tape.

                        "It never ceases to amaze me that a spacecraft launched in 1977 can be fixed remotely from Earth." ― Brian Cox

                        B 1 Reply Last reply
                        0
                        • X xiecsuk

                          I have been fretting over the question of hacked userids/passwords. As I understand it, the stolen password is not actually the password but a hashed version of it which the hacker then decodes by brute force and ignorance to arrive at the actual password. But what if that wasn't the actual password. What if the system I was using performed some sort of transformation before it hashed the password for storage. For example, when I log on to my account, I type in pass123 as my password, but unbeknown to me, the system translates that to 321ssap, hashes it and stores it. The hacker tries to log onto my userid and types in 321ssap as my password which is what he thinks it is. This gets translated to 123pass and hashed for checking. But that hash value is not the same as the one that is stored. Therefore an "Incorrect password" error message is generated. Am I missing something here?

                          K Offline
                          K Offline
                          Keith Barrow
                          wrote on last edited by
                          #12

                          xiecsuk wrote:

                          Am I missing something here?

                          Quite a lot, because it's pretty complicated. Firstly, you are assuming they've hashed the password, some (even large companies) don't they use a symmetric algorithm. If a company can send your password to you, say via e-mail, they are using a symmetric algorithm (at best).This is insecure. The idea is the hashing is one way, so the hash cannot be reversed, so password123 ---> 7FDEADBEEF or whatever. It the password table is stolen there are two immediate vulnerabilities. First off, if the system allows a bad password such as "password" this is going to be the most common value stored in the password field across the table, and you can work backwards through the most probable ones. The second vulnerability is something called a rainbow table, this reduces the amount of time it takes to reverse engineer a password that is going to lead to a particular hash. Worse, these tables are readily available, so you don't need the compuation time to get started. You can salt the password (adding a random bit of text which you store) in various ways, e.g. add then hash or has the password, salt then hash the result. This mitigates against the vunerabilities described above, but given enough time brute force strategies will always win - even if enough time means from now until after the end of the universe.

                          KeithBarrow.net[^] - It might not be very good, but at least it is free!

                          R 1 Reply Last reply
                          0
                          • Kornfeld Eliyahu PeterK Kornfeld Eliyahu Peter

                            xiecsuk wrote:

                            As I understand it, the stolen password is not actually the password but a hashed version of it

                            In most cases, lately reported over media, it was plain text... :((

                            Skipper: We'll fix it. Alex: Fix it? How you gonna fix this? Skipper: Grit, spit and a whole lotta duct tape.

                            Richard DeemingR Offline
                            Richard DeemingR Offline
                            Richard Deeming
                            wrote on last edited by
                            #13

                            http://plaintextoffenders.com/[^]


                            "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                            "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

                            OriginalGriffO 1 Reply Last reply
                            0
                            • A amagitech

                              I am mathematican.And my english isn't good. So sorry if I fail to make oneself understood. I have studied cryptology for a little while. I can say that: Hash code's inverse functions's solutions calculates forever.

                              OriginalGriffO Offline
                              OriginalGriffO Offline
                              OriginalGriff
                              wrote on last edited by
                              #14

                              Not all of them: MD5 is officially "broken" (and has been for years) - it is possible to reverse MD5 and get a usable password input directly from the output. Not necessarily the original input, but one that generates the same hash value. http://cryptocrats.com/crypto/md5-the-hash-algorithm-is-now-broken/[^] SHA-1 is considered insecure (because there are ways to generate collisions that don;t need a brute force attack), but SHA-2 is still OK, for the moment. http://arstechnica.com/security/2012/10/sha1-crypto-algorithm-could-fall-by-2018/[^]

                              Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

                              "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
                              "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

                              1 Reply Last reply
                              0
                              • X xiecsuk

                                I have been fretting over the question of hacked userids/passwords. As I understand it, the stolen password is not actually the password but a hashed version of it which the hacker then decodes by brute force and ignorance to arrive at the actual password. But what if that wasn't the actual password. What if the system I was using performed some sort of transformation before it hashed the password for storage. For example, when I log on to my account, I type in pass123 as my password, but unbeknown to me, the system translates that to 321ssap, hashes it and stores it. The hacker tries to log onto my userid and types in 321ssap as my password which is what he thinks it is. This gets translated to 123pass and hashed for checking. But that hash value is not the same as the one that is stored. Therefore an "Incorrect password" error message is generated. Am I missing something here?

                                M Offline
                                M Offline
                                Mark_Wallace
                                wrote on last edited by
                                #15

                                Correct. To horse with passwords, you need a battery of scripts, to handle the myriad staple functions that protect them.

                                I wanna be a eunuchs developer! Pass me a bread knife!

                                R F 2 Replies Last reply
                                0
                                • Kornfeld Eliyahu PeterK Kornfeld Eliyahu Peter

                                  Relax - it was no trouble to retrieve your password...It was stored as plain text to avoid any future problem :laugh:

                                  Skipper: We'll fix it. Alex: Fix it? How you gonna fix this? Skipper: Grit, spit and a whole lotta duct tape.

                                  B Offline
                                  B Offline
                                  Bergholt Stuttley Johnson
                                  wrote on last edited by
                                  #16

                                  also to speed things up we have now stored it on 500000 servers location in dubious countries around the world

                                  You cant outrun the world, but there is no harm in getting a head start Real stupidity beats artificial intelligence every time.

                                  1 Reply Last reply
                                  0
                                  • D den2k88

                                    Seriously, my (mandatory) car insurance company sent me the current password in plain text when I clicked on "forgot my password" (turned out I didn't forget my password, they simply changed the accepted character set for the passwords between my logins so my password wasn't valid but I couldn't log in to change it. Had to spend 3 days on the phone and threaten them with Hell, Damnation and going to another company). That means either my password was stored in clear text or it was sotred in such a way that it was recoverable. That is BAD.

                                    Geek code v 3.12 GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- r++>+++ y+++* Weapons extension: ma- k++ F+2 X // No comment

                                    OriginalGriffO Offline
                                    OriginalGriffO Offline
                                    OriginalGriff
                                    wrote on last edited by
                                    #17

                                    No, no - they store your password and check it as a nice secure SHA-2 hash value. And in case you need to recover it (as you did) they store the plain text version in the same table! :laugh:

                                    Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

                                    "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
                                    "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

                                    B P 2 Replies Last reply
                                    0
                                    • Richard DeemingR Richard Deeming

                                      http://plaintextoffenders.com/[^]


                                      "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                                      OriginalGriffO Offline
                                      OriginalGriffO Offline
                                      OriginalGriff
                                      wrote on last edited by
                                      #18

                                      "Page 1 of 289" :sigh:

                                      Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

                                      "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
                                      "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

                                      B 1 Reply Last reply
                                      0
                                      • OriginalGriffO OriginalGriff

                                        No, no - they store your password and check it as a nice secure SHA-2 hash value. And in case you need to recover it (as you did) they store the plain text version in the same table! :laugh:

                                        Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

                                        B Offline
                                        B Offline
                                        Bergholt Stuttley Johnson
                                        wrote on last edited by
                                        #19

                                        no that was the old way, now its just stored as "password" so their is no need to decrypt it (saves the NSA 5000 man hours a month )

                                        You cant outrun the world, but there is no harm in getting a head start Real stupidity beats artificial intelligence every time.

                                        1 Reply Last reply
                                        0
                                        • A amagitech

                                          I am mathematican.And my english isn't good. So sorry if I fail to make oneself understood. I have studied cryptology for a little while. I can say that: Hash code's inverse functions's solutions calculates forever.

                                          D Offline
                                          D Offline
                                          den2k88
                                          wrote on last edited by
                                          #20

                                          Yes but a brute force dictionary attack confronting to a DB of hashed passwords does not. It is a common bruteforce: hash("aaaa") = $1. Does $1 exist in the DB? hash("aaab") = $2. Does $2 exist in the DB? .... long, as brute force attacks are, but it works. Unless there is some salt in the hashed password.

                                          Geek code v 3.12 GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- r++>+++ y+++* Weapons extension: ma- k++ F+2 X // No comment

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups