Well what kind of string am I working with?  For all I know, you could've
hashed a whole book.  Is there a length limit? (as there would very likely
be if this was a password) 

-----Original Message-----
From: Ryan Guill [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, November 29, 2005 4:36 PM
To: CF-Talk
Subject: Re: pseudo-memory leak

Tell you what.  See how long it takes you to brute force this hash. 
Post the cleartext when you get it.

6AF59B04BA48B18C15E3CB3ACB2BA75B

I want to see how long it takes you.

On 11/29/05, Russ <[EMAIL PROTECTED]> wrote:
> The passwords in windows are stored as hashes.  They are not stored as 
> plaintext.  In order to get the password, you would need to brute 
> force the hash.
>
> Cracking windows passwords is an old idea with a great set of tools 
> behind it.  We are just using that knowledge to show that you 
> shouldn't store passwords in cookies, hashed or not.
>
> As far as I understand it, if you store something as a client 
> variable, there is no way for hacker to get at it (unless of course he 
> somehow gets into your database server, in which case all bets are 
> off).  But if you store it as a cookie, it's much more vulnerable to foul
play.
>
>
>
> -----Original Message-----
> From: Ryan Guill [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, November 29, 2005 4:14 PM
> To: CF-Talk
> Subject: Re: pseudo-memory leak
>
> If you are an admin on the machine you could get the passwords even if 
> they weren't in cookies!  If someone ever puts in their password at 
> all outside of ssl, you can sniff the password.  If someone steals the 
> SAM file, what does it matter where I store the password or how I hash it?
>
> what does that have to do with cookies vs client variables and the 
> security impact of the two?
>
> On 11/29/05, Russ <[EMAIL PROTECTED]> wrote:
> > Not, really.  There are different ways of getting hashes.  One is 
> > you can be an admin on the machine, and you can get the passwords of 
> > all the
> users.
> > Another way is to sniff it going across the network.  You can also 
> > steal the SAM file and get the password that way.  The point is, you 
> > don't always need to have a login on the system (or physical access 
> > to the machine) to get people's passwords off of it.
> >
> > -----Original Message-----
> > From: Robertson-Ravo, Neil (RX)
> > [mailto:[EMAIL PROTECTED]
> > Sent: Tuesday, November 29, 2005 3:22 PM
> > To: CF-Talk
> > Subject: RE: pseudo-memory leak
> >
> >  LOL, isnt that just like saying - I can get into any computer which 
> > is locked......if you give me the password?
> >
> >
> >
> >
>
>
>
> 



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Discover CFTicket - The leading ColdFusion Help Desk and Trouble 
Ticket application

http://www.houseoffusion.com/banners/view.cfm?bannerid=48

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:225636
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

Reply via email to