The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#1
|
|||
|
|||
![]()
hello
if someone gains access to the vbulletin database, is it possible for the hacker to know the users pass? i mean they are in hash format could they retrieve the passwords from the hash? how long would it take to perform this task, if possible |
#2
|
||||
|
||||
![]()
It would take ages to perform for each individual password
|
#3
|
|||
|
|||
![]()
for ages you mean days, weeks, months?
even with the salt thing i think vbulletin has in the passwords? |
#4
|
|||
|
|||
![]()
md5 salted... to bruteforce would take years I think
|
#5
|
||||
|
||||
![]()
By ages I mean, a lot longer than it'd ever be worth
|
#6
|
||||
|
||||
![]()
There are no known rainbow table attacks for this type of hash. The only method would be to brute force, and that would take years. After brute forcing the hash, you would need to brute force the actual password's hash, which would take less time, but still time (although this time, rainbow tables are possible).
|
#7
|
|||
|
|||
![]()
thanks for your answers
|
#8
|
||||
|
||||
![]()
Actually with salt and the latest dictionaries, it is done in about 20 seconds.. if the perp knows what the salt is.
Actually Admins are the targets, what good would it do to hack a mod or member? You want a secure password? use 4 to 5 words with spaces and a couple symbols. That is impossible to decode for even the best hackers. I use 1024 bit encryption in my passwords.. even the feds can't decode that, lol |
#10
|
|||
|
|||
![]() Quote:
he has made a screenshot of mods and admin area to prove he was there. the mod pass was 10 chars long and it was portuguese, its still easy to be discovered? |
![]() |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|