Paypal warning.
Moderator: Forum Moderators
-
Dr. kitteny berk
- Morbo

- Posts: 19676
- Joined: December 10th, 2004, 21:53
- Contact:
-
TezzRexx
- Dr Zoidberg

- Posts: 4072
- Joined: February 8th, 2005, 15:54
- Location: BURMINGHUM, England
- Contact:
LOLS! You touched wood!Fear wrote:Were your passwords guessable?
I use Keepass to generate and store all my passwords. I tend to shy away from words or non-random data for important sites such as banks, etc. So far so good....
*touches wood*
But to the question, "Were your passwords guessable?" I severely doubt it, knowing how much Berk and Proff win at the internets.
-
Dr. kitteny berk
- Morbo

- Posts: 19676
- Joined: December 10th, 2004, 21:53
- Contact:
Yes (not guessable, but hardly super secure etc) , but the fact is, 3 people from one small site don't all get their paypal accounts hacked within a few days unless there's something more iffy at play.Fear wrote:Were your passwords guessable?
Also: paypal would fix this kind of issue in a second if they moved to a security code and password system.
Was it the same password as your forums one?
It's possible they took a dump of the sql database and brute-horse'd the md5 hashed passwords?
Whilst the link seems very likely to be 5punk I can't fathom how visiting a website could have resorted in cookies for another domain being retrieved. and even then paypal doesn't remember your password *ever*, only the browser does.
It's possible they took a dump of the sql database and brute-horse'd the md5 hashed passwords?
Whilst the link seems very likely to be 5punk I can't fathom how visiting a website could have resorted in cookies for another domain being retrieved. and even then paypal doesn't remember your password *ever*, only the browser does.
-
Dr. kitteny berk
- Morbo

- Posts: 19676
- Joined: December 10th, 2004, 21:53
- Contact:
-
Sheriff Fatman
- Optimus Prime

- Posts: 1132
- Joined: March 5th, 2006, 22:54
-
Dr. kitteny berk
- Morbo

- Posts: 19676
- Joined: December 10th, 2004, 21:53
- Contact:
Because MD5 is a fixed hashing algorithm (and phpbb doesn't use a nonce) it is possible they have a massive table of well known hashed passwords.Sheriff Fatman wrote:Cracking an md5 is a bit of a bastard though isn't it?
That, and they weren't random so a dictionary or semi-dictionary based attack would take mere minutes, if not seconds.
-
Sheriff Fatman
- Optimus Prime

- Posts: 1132
- Joined: March 5th, 2006, 22:54
It still is, the likelihood of two files having the same md5 hash and having different content is phenomenally small.Sheriff Fatman wrote:
Crikey. MD5 was the the be-all-and-end-all of computer forensics with regard to proving that file X was the same file X on a paedo's computer.
Probably different circumstances, mind.
-
Sheriff Fatman
- Optimus Prime

- Posts: 1132
- Joined: March 5th, 2006, 22:54
That's a given; but god knows how big said table would have to be to pre-empt MD5. The possibilities run into the millions.Fear wrote:
Because MD5 is a fixed hashing algorithm (and phpbb doesn't use a nonce) it is possible they have a massive table of well known hashed passwords.
Hehe, times have changed. The last brute attack software I tested took hours to do an eight character alphanumeric password.Fear wrote:That, and they weren't random so a dictionary or semi-dictionary based attack would take mere minutes, if not seconds.
-
Dr. kitteny berk
- Morbo

- Posts: 19676
- Joined: December 10th, 2004, 21:53
- Contact:
Fairly huge.Sheriff Fatman wrote:That's a given; but god knows how big said table would have to be to pre-empt MD5. The possibilities run into the millions.
Hehe, times have changed. The last brute attack software I tested took hours to do an eight character alphanumeric password.
http://en.wikipedia.org/wiki/Rainbow_table
-
ProfHawking
- Zombie

- Posts: 2101
- Joined: February 20th, 2005, 21:31
Rainbow tables are extremely fast for non-salted or non-nonced hashes. (phpbb)
That was with 2003s computation power.Making a Faster Cryptanalytic Time-Memory Trade-Off by Philippe Oechslin wrote:Using 1.4GB of data (two CD-ROMs) we can crack 99.9% of all alphanumerical passwords hashes (2 37 ) in 13.6 seconds
-
Dr. kitteny berk
- Morbo

- Posts: 19676
- Joined: December 10th, 2004, 21:53
- Contact:
-
Sheriff Fatman
- Optimus Prime

- Posts: 1132
- Joined: March 5th, 2006, 22:54
-
ProfHawking
- Zombie

- Posts: 2101
- Joined: February 20th, 2005, 21:31