![]() |
database hacked > know users passwords
hello
if someone gains access to the vbulletin database, is it possible for the hacker to know the users pass? i mean they are in hash format could they retrieve the passwords from the hash? how long would it take to perform this task, if possible |
It would take ages to perform for each individual password
|
Quote:
even with the salt thing i think vbulletin has in the passwords? |
md5 salted... to bruteforce would take years I think
|
Quote:
|
There are no known rainbow table attacks for this type of hash. The only method would be to brute force, and that would take years. After brute forcing the hash, you would need to brute force the actual password's hash, which would take less time, but still time (although this time, rainbow tables are possible).
|
thanks for your answers
|
Quote:
Quote:
You want a secure password? use 4 to 5 words with spaces and a couple symbols. That is impossible to decode for even the best hackers. I use 1024 bit encryption in my passwords.. even the feds can't decode that, lol |
How about we go all out and use Whirlpool? :)
|
Quote:
he has made a screenshot of mods and admin area to prove he was there. the mod pass was 10 chars long and it was portuguese, its still easy to be discovered? |
If he got access to the database, he could just create a new account with Admin access if he wanted. Or he could temporarily change the password of your moderator.
You have more problems to worry about than a moderator's account. |
Quote:
|
Cracking hashes is pretty easy if you know what are you doing...
see this for examples... https://vborg.vbsupport.ru/showthread.php?t=199526 |
Err, you are ALL wrong!
Cracking vBulletin hash's and salts is extremely easy. All you need to know, is the hash format, which is: MD5(MD5(password).salt) People load a dictionary, set it to dictionary mode, load the user: password:email list, and within seconds, all the easy passwords are cracked. Leave it an hour or so and the more difficult passwords are cracked. If the rest aren't cracked by the end, changes are they're using an extremely hard password. Make sure you use a combination of lowercase, higher case, numbers, letters, and special characters when you generating a password: Example: ()Q@[]4[[!*^Yejfbn f(@344{P}{(*&@ - Virtually impossible to brute & dictionary attack. Cheers |
That is assuming the attacker knows the salt.
|
The salt hash is IN the database marked under "salt".
If they have the database, they have the salt, email, and basically every single bit of info displayed on the website. Cheers, |
Quote:
|
All times are GMT. The time now is 12:13 AM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|