Jump to content

Recommended Posts

$pass = "a passsword";
$HASH = md5($pass);

 

$HASH goes into the database

 

now

//to check the password is correct you would so thingt like this
$passFromUser ="wrongpassword"
//compare
$HASHFromUser = md5($passFromUser);
//to HASH stored in the database.

 

so you compare the results of the MD5 to each other..

 

i hope that makes sense

Link to comment
https://forums.phpfreaks.com/topic/50253-un-md5ing/#findComment-246699
Share on other sites

ohh yeh i know that im using md5 for something else im using it in the url but could you make a script to keep md5ing things to compare like

 

a , b ,c so on untill z then aa, ab, ac, so on then ba, bb, bc ect so on unill it could end up like 50 letters long like abcdef, abcdeg so on and on  if you get me

Link to comment
https://forums.phpfreaks.com/topic/50253-un-md5ing/#findComment-246852
Share on other sites

but how come if you get the md5 from the database then md5 the users input and compare they would match so you cant just use a loop to go through?

You're asking about brute-force attacks, which of course are blatantly possible - so why even ask that question?

 

and it's not possible to check if the nth character is correct, you must and can only compare the entire value.

Link to comment
https://forums.phpfreaks.com/topic/50253-un-md5ing/#findComment-246879
Share on other sites

it actually is like a brute forcer the way that i think you would have to go through to find out but if you had something like the md5 field to the page name and the page name is 'af' then it would md5 the following and then compare them.:

a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
q
x
y
z
aa
ab
ac
ad
ae
af - match

 

get me?

Link to comment
https://forums.phpfreaks.com/topic/50253-un-md5ing/#findComment-246883
Share on other sites

pointless this post is going no where.

 

OK MD5 AKA (Message-Digest algorithm 5)

you can NOT just use UNMD5 it doesn't work like that..

 

brute forcer takes time but will work

time would be about 3 weeks using 6000 computers

 

the best example ican give is if you is a if a document was a person then the MD5 would be the finger print, once you have the finger print you can match it to a person but not rebuild that person from the finger print...

 

advice:

Theirs a number of MD5 reverse lookup databases, which make it easy to decrypt password hashed with plain MD5. To prevent such attacks you can add a salt to your passwords before hashing them.

Also, it is a good idea to apply the hashing function (MD5 in this case) more than once—see key strengthening. It increases the time needed to encode a password and discourages dictionary attacks.

Link to comment
https://forums.phpfreaks.com/topic/50253-un-md5ing/#findComment-246952
Share on other sites

instead of attacking the guy why don't you guys think about alternatives to the same end.

 

yes, you can't un-md5 (without 6000 computers) and yes, sorry to say it but you're being annoying by not getting that fact.

 

but there are alternatives. you could create your own simple encrypt function. use string replace and swap soem of your characters. ie a=g b=z etc. you could do something simple that would encrypt your scripts as you wish them to be, for whatever strange reason you need to do this.

Link to comment
https://forums.phpfreaks.com/topic/50253-un-md5ing/#findComment-247475
Share on other sites

This thread is more than a year old. Please don't revive it unless you have something important to add.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.