Tell you what. See how long it takes you to brute force this hash. Post the cleartext when you get it.
6AF59B04BA48B18C15E3CB3ACB2BA75B I want to see how long it takes you. On 11/29/05, Russ <[EMAIL PROTECTED]> wrote: > The passwords in windows are stored as hashes. They are not stored as > plaintext. In order to get the password, you would need to brute force the > hash. > > Cracking windows passwords is an old idea with a great set of tools behind > it. We are just using that knowledge to show that you shouldn't store > passwords in cookies, hashed or not. > > As far as I understand it, if you store something as a client variable, > there is no way for hacker to get at it (unless of course he somehow gets > into your database server, in which case all bets are off). But if you > store it as a cookie, it's much more vulnerable to foul play. > > > > -----Original Message----- > From: Ryan Guill [mailto:[EMAIL PROTECTED] > Sent: Tuesday, November 29, 2005 4:14 PM > To: CF-Talk > Subject: Re: pseudo-memory leak > > If you are an admin on the machine you could get the passwords even if they > weren't in cookies! If someone ever puts in their password at all outside > of ssl, you can sniff the password. If someone steals the SAM file, what > does it matter where I store the password or how I hash it? > > what does that have to do with cookies vs client variables and the security > impact of the two? > > On 11/29/05, Russ <[EMAIL PROTECTED]> wrote: > > Not, really. There are different ways of getting hashes. One is you > > can be an admin on the machine, and you can get the passwords of all the > users. > > Another way is to sniff it going across the network. You can also > > steal the SAM file and get the password that way. The point is, you > > don't always need to have a login on the system (or physical access to > > the machine) to get people's passwords off of it. > > > > -----Original Message----- > > From: Robertson-Ravo, Neil (RX) > > [mailto:[EMAIL PROTECTED] > > Sent: Tuesday, November 29, 2005 3:22 PM > > To: CF-Talk > > Subject: RE: pseudo-memory leak > > > > LOL, isnt that just like saying - I can get into any computer which > > is locked......if you give me the password? > > > > > > > > > > > > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~| Logware (www.logware.us): a new and convenient web-based time tracking application. Start tracking and documenting hours spent on a project or with a client with Logware today. Try it for free with a 15 day trial account. http://www.houseoffusion.com/banners/view.cfm?bannerid=67 Message: http://www.houseoffusion.com/lists.cfm/link=i:4:225632 Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4 Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4 Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4 Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

