<snip>
Firstly, I need to find out which hash is used by rom itself for
encryption. 
If it's system crypt() (highly doubtful, but maybe), then I'll go about
my 
merry way and try to figure out what I'm doing wrong elsewhere.
</snip>

It IS system crypt(). So rest assured there.
ANY insignificant thing might cause this to hash up... I haven't used
*SQL databases yet so I can not say for sure, but are there any special
symbols or such that the string datatype uses as an escape character in
some form? Or possibly the reading/writing from/to the database is
sneaking in a space or dropping non-printable characters, since crypt
can return string with any number from 0-255 (the standard ASCII range,
or char size, depending on how you want to look at it...)

<snip>
IF it's not that (or otherwise php compatible) then I need to find out
how to 
decrypt the password, without changing everything to clear passwords. Is
it 
THAT hard of a question to ask which hash is used?
</snip>

Btw, crypt does some pretty funky stuff in its process that makes it so
the password can NOT be decrypted. Any password encryption routine that
is worth a grain of salt (no pun intended...well maybe...) is unable to
be decrypted. That is why you can not use a linux admin tool to view
passwords of users on your system, or even in windows, you are unable to
view user's passwords.

This is why dictionary attacks and brute forcing came about...since that
was the only way to 'guess' a password: encrypting a string in the same
method as what you are trying to 'guess' and comparing the two.

Ammaross Danan


Reply via email to