Obtaining the MD5 hash is not that difficult. A lot of shared hosts do not protect the web roots of their users properly which makes it a trivial task to obtain the contents of wp-config.php and connect to the user's database and obtain the hash. Simply using word that are not a part of any language will keep you safe against weaker cracking attempts; however, a determined hacker can, and will make use of rainbow tables which have hashes not only for dictionary words, but also huge collections of random alphanumeric and special character strings.

So, IF the host is setup properly, IF the application is not vulnerable to queries that can return the admin password hash and IF the hacker is not determined enough to use a rainbow table to crack the hash, then yes, it's nothing to worry about.

From what I understand, it's a relatively trivial matter to add a "salt" function that would further protect the MD5 hash. I believe this would be the best solution because the upgrade script could prompt the user for a salt string and the hashes could be converted as part of the upgrade process. Another option is generating the salt string automatically and outputting it for the user to save in a safe place.

Bull3t wrote:
You need to know the MD5 hash of the password in the first place and even
then it is just luck of the draw, it really isn't that worrying. Just use a
password that isn't part of a language?


--------------------------------------------
Bull3t
http://www.bull3t.me.uk/

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:wp-testers-
[EMAIL PROTECTED] On Behalf Of Pål GD
Sent: 21 November 2007 13:45
To: [email protected]
Subject: Re: [wp-testers] Wordpress Google MD5 hash crack

Cornell Finch wrote:
I know this probably isn't the right place to put this but I don't
know where else to submit it:

http://www.theregister.co.uk/2007/11/21/google_md5_crack/

Is this something we should be worried about?

Collin
Yes, indeed. Wordpress should have been doing salting[1], which I don't
think they do.

[1] http://en.wikipedia.org/wiki/Salting_(cryptography)
_______________________________________________
wp-testers mailing list
[email protected]
http://lists.automattic.com/mailman/listinfo/wp-testers

No virus found in this incoming message.
Checked by AVG Free Edition.
Version: 7.5.503 / Virus Database: 269.16.2/1143 - Release Date:
21/11/2007
10:01


No virus found in this outgoing message.
Checked by AVG Free Edition. Version: 7.5.503 / Virus Database: 269.16.2/1143 - Release Date: 21/11/2007
10:01
_______________________________________________
wp-testers mailing list
[email protected]
http://lists.automattic.com/mailman/listinfo/wp-testers


--
Best regards,

James Morris
PkbCS, LLC
[EMAIL PROTECTED]
http://pkbcs.com/

_______________________________________________
wp-testers mailing list
[email protected]
http://lists.automattic.com/mailman/listinfo/wp-testers

Reply via email to