Random user switching?

intogamer

Lifer
Dec 5, 2004
19,219
1
76
Hey Jason, I would like to know whats up with users signing on as a different user? I remember this happened a while back around when some users were able to use a html exploit? for custom avatars. Is there some kind of bug when you do software updates?

As I posted in another thread is it possible for a user on a different account go check his cookies to get the password because he is already logged in? Just how LoKe was able to download login information from AT servers?

Fusetalk at risK?
 

Alone

Diamond Member
Nov 19, 2006
7,490
0
0
Even with the cookies, they won't have your password, but rather a hashed version of it. It's unlikely that anyone would be able to decrypt that hash and have your password. However, it is possible for them to continue logging on as their victim, so long as the password to the account isn't changed (doing so would change the hash).
 

Jason Clark

Diamond Member
Oct 9, 1999
5,497
1
0
I'm quite sure the login issue was nailed, from what I can tell it's a bug in the FuseTalk cookie management. I will ensure it gets passed on to them on Monday. All passwords are hashed when they are stored, so it's impossible for someone to get your password.

Cheers.
 

Alone

Diamond Member
Nov 19, 2006
7,490
0
0
Originally posted by: Jason Clark
I'm quite sure the login issue was nailed, from what I can tell it's a bug in the FuseTalk cookie management. I will ensure it gets passed on to them on Monday. All passwords are hashed when they are stored, so it's impossible for someone to get your password.

Cheers.

Let's not say impossible.
 

intogamer

Lifer
Dec 5, 2004
19,219
1
76
What if someone saved the hash, so they would have a encrypted copy of your password?

Are hashes all the same?
 

intogamer

Lifer
Dec 5, 2004
19,219
1
76
Originally posted by: Alone
Originally posted by: Jason Clark
I'm quite sure the login issue was nailed, from what I can tell it's a bug in the FuseTalk cookie management. I will ensure it gets passed on to them on Monday. All passwords are hashed when they are stored, so it's impossible for someone to get your password.

Cheers.

Let's not say impossible.

Hehe I did see a video on Youtube for cracking Windows Admin. They used a site to decrypt the hash I believe
 

Alone

Diamond Member
Nov 19, 2006
7,490
0
0
Originally posted by: intogamer
What if someone saved the hash, so they would have a encrypted copy of your password?

Are hashes all the same?

There are plenty of ways to encrypt a password, and all the hashes will be different. Even if we had the same password, our hashes would more than likely be different.

Originally posted by: intogamer
Hehe I did see a video on Youtube for cracking Windows Admin. They used a site to decrypt the hash I believe

There are plenty of LiveCD's that will crack a windows password easily.
 

intogamer

Lifer
Dec 5, 2004
19,219
1
76
Originally posted by: Alone
Originally posted by: intogamer
What if someone saved the hash, so they would have a encrypted copy of your password?

Are hashes all the same?

There are plenty of ways to encrypt a password, and all the hashes will be different. Even if we had the same password, our hashes would more than likely be different.

What I'm talking about is there different types of hashes? Like different levels or hashes are just one way on encrypting?
 

Alone

Diamond Member
Nov 19, 2006
7,490
0
0
Originally posted by: intogamer
Originally posted by: Alone
Originally posted by: intogamer
What if someone saved the hash, so they would have a encrypted copy of your password?

Are hashes all the same?

There are plenty of ways to encrypt a password, and all the hashes will be different. Even if we had the same password, our hashes would more than likely be different.

What I'm talking about is there different types of hashes? Like different levels or hashes are just one way on encrypting?

There are plenty, like md5 and sha1.
 

intogamer

Lifer
Dec 5, 2004
19,219
1
76
Originally posted by: Alone
Originally posted by: intogamer
Originally posted by: Alone
Originally posted by: intogamer
What if someone saved the hash, so they would have a encrypted copy of your password?

Are hashes all the same?

There are plenty of ways to encrypt a password, and all the hashes will be different. Even if we had the same password, our hashes would more than likely be different.

What I'm talking about is there different types of hashes? Like different levels or hashes are just one way on encrypting?

There are plenty, like md5 and sha1.

Now which one does AT use?
 

Alone

Diamond Member
Nov 19, 2006
7,490
0
0
Originally posted by: intogamer
Now which one does AT use?

It's hard to know for sure. It could be alphanumeric symbol with MD5, it could be multiple MD5's on the same string, it could be a SHA1 hash, encrypted with Md5. Who knows.

But I just hope it's simply not SHA1, because that has been broken already. =p
 

intogamer

Lifer
Dec 5, 2004
19,219
1
76
Originally posted by: Alone
Originally posted by: intogamer
Now which one does AT use?

It's hard to know for sure. It could be alphanumeric symbol with MD5, it could be multiple MD5's on the same string, it could be a SHA1 hash, encrypted with Md5. Who knows.

But I just hope it's simply not SHA1, because that has been broken already. =p

Correct! Hehhe Jason another bug! The OP gets to select which post is the answer.
 

Alone

Diamond Member
Nov 19, 2006
7,490
0
0
Originally posted by: intogamer
Correct! Hehhe Jason another bug! The OP gets to select which post is the answer.

The OP is supposed to be able to do that.
 

bsobel

Moderator Emeritus<br>Elite Member
Dec 9, 2001
13,346
0
0
Originally posted by: Alone
Originally posted by: intogamer
Now which one does AT use?
It's hard to know for sure. It could be alphanumeric symbol with MD5, it could be multiple MD5's on the same string, it could be a SHA1 hash, encrypted with Md5. Who knows.
But I just hope it's simply not SHA1, because that has been broken already. =p

:roll: Please show reference to where SHA1 is broken. Theorietically weakened perhaps, broken, no. I love how you mention if could be MD5 but hope its not SHA1 where MD5 is depreciated for a reason and SHA1 is still the primary secure hashing scheme in use....
 

Alone

Diamond Member
Nov 19, 2006
7,490
0
0
Originally posted by: bsobel
Originally posted by: Alone
Originally posted by: intogamer
Now which one does AT use?
It's hard to know for sure. It could be alphanumeric symbol with MD5, it could be multiple MD5's on the same string, it could be a SHA1 hash, encrypted with Md5. Who knows.
But I just hope it's simply not SHA1, because that has been broken already. =p

:roll: Please show reference to where SHA1 is broken. Theorietically weakened perhaps, broken, no. I love how you mention if could be MD5 but hope its not SHA1 where MD5 is depreciated for a reason and SHA1 is still the primary secure hashing scheme in use....

http://www.schneier.com/blog/a...05/02/sha1_broken.html
http://intertwingly.net/blog/2005/02/16/SHA-1-Broken
http://www.nemein.com/people/r..._propably__broken.html
http://it.slashdot.org/article...02/16/0146218&from=rss
http://scottstuff.net/blog/art...005/02/16/sha-1-broken

Enjoy. If I'm missing something critically important, I wouldn't have any problems with being corrected.
 

bsobel

Moderator Emeritus<br>Elite Member
Dec 9, 2001
13,346
0
0

Well it might be an intellectual debate, I think Bruce greatly over simplifies things. At best sha1 is reduce. There is still no reasonably low cost way for me to generate arbitrary content that matches to a specific sha. What I can do his generate semi-arbitrary content which matches to a specific sha with less than 2^80 operations (the statistical average).

In practice this means why you can generate content with the same sha, the cookie as used here would be meaningless since you simply couldn't make 'my' cookie sha to the same as your's (given formatting and such, not enough opportunity to generate the semi-arbitrary part).
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |