| View previous topic :: View next topic |
| Author |
Message |
HomerSexual Grandmaster Cheater Supreme
Reputation: 5
Joined: 03 Feb 2007 Posts: 1657
|
Posted: Sat Jun 30, 2007 3:39 pm Post subject: MD5 String Hash |
|
|
Modify Source code as you wish
its using CryptAPI
_________________
|
|
| Back to top |
|
 |
Kevin Grandmaster Cheater Supreme
Reputation: 0
Joined: 07 Mar 2007 Posts: 1139 Location: Spiderman-World
|
Posted: Sat Jun 30, 2007 3:40 pm Post subject: |
|
|
what exactly is it?
|
|
| Back to top |
|
 |
HomerSexual Grandmaster Cheater Supreme
Reputation: 5
Joined: 03 Feb 2007 Posts: 1657
|
Posted: Sat Jun 30, 2007 3:44 pm Post subject: |
|
|
it encrypts your string to md5 hash o.o
_________________
|
|
| Back to top |
|
 |
Kevin Grandmaster Cheater Supreme
Reputation: 0
Joined: 07 Mar 2007 Posts: 1139 Location: Spiderman-World
|
Posted: Sat Jun 30, 2007 3:45 pm Post subject: |
|
|
| md5 hash is... ?
|
|
| Back to top |
|
 |
HomerSexual Grandmaster Cheater Supreme
Reputation: 5
Joined: 03 Feb 2007 Posts: 1657
|
Posted: Sat Jun 30, 2007 3:54 pm Post subject: |
|
|
www.google.com
its a type of encryption (points to oib's post)
edit:
In cryptography, MD5 (Message-Digest algorithm 5) is a widely used cryptographic hash function with a 128-bit hash value. As an Internet standard (RFC 1321), MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. An MD5 hash is typically a 32-character hexadecimal number.
_________________
|
|
| Back to top |
|
 |
appalsap Moderator
Reputation: 0
Joined: 27 Apr 2006 Posts: 6753 Location: Pakistan
|
Posted: Sat Jun 30, 2007 4:49 pm Post subject: |
|
|
| Nice.
|
|
| Back to top |
|
 |
HomerSexual Grandmaster Cheater Supreme
Reputation: 5
Joined: 03 Feb 2007 Posts: 1657
|
Posted: Sat Jun 30, 2007 4:56 pm Post subject: |
|
|
im gonna make a decryptor because MD5 decryption is good
You can find out passwords and such lol
_________________
|
|
| Back to top |
|
 |
appalsap Moderator
Reputation: 0
Joined: 27 Apr 2006 Posts: 6753 Location: Pakistan
|
Posted: Sat Jun 30, 2007 4:57 pm Post subject: |
|
|
| You can't decrypt MD5, it's a hashing algorithm, not an encryption algorithm. That's why it's used for passwords.
|
|
| Back to top |
|
 |
HomerSexual Grandmaster Cheater Supreme
Reputation: 5
Joined: 03 Feb 2007 Posts: 1657
|
Posted: Sat Jun 30, 2007 4:59 pm Post subject: |
|
|
yea i just found that out right now, lol
if you coulddecrypt it would it be a godly crack me program?
_________________
|
|
| Back to top |
|
 |
DeltaFlyer Grandmaster Cheater
Reputation: 0
Joined: 22 Jul 2006 Posts: 666
|
Posted: Sat Jun 30, 2007 6:04 pm Post subject: |
|
|
| blankrider wrote: | yea i just found that out right now, lol
if you coulddecrypt it would it be a godly crack me program? |
You can't decrypt it.... It's called a hash algorithm. Every hash has potentially infinite number of original files that it could be based upon.
Think of it this way: you can't fit every single possibility (infinite) into an md5 hash (32 hex characters). But since every input must have an output, the output has to duplicate.
_________________
Wow.... still working at 827... what's INCA thinking?
zomg l33t hax at this place (IE only). Over 150 people have used it, what are YOU waiting for? |
|
| Back to top |
|
 |
HomerSexual Grandmaster Cheater Supreme
Reputation: 5
Joined: 03 Feb 2007 Posts: 1657
|
Posted: Sat Jun 30, 2007 6:13 pm Post subject: |
|
|
ahhh i get you
makes sense
thanks
_________________
|
|
| Back to top |
|
 |
Ksbunker Advanced Cheater
Reputation: 0
Joined: 18 Oct 2006 Posts: 88
|
Posted: Sat Jun 30, 2007 8:25 pm Post subject: re: |
|
|
While MD5 cannot be reversed or hacked using typical methods.
MD5 is not a 100% secure hashing scheme. There have been many documented reports of 'collisions'. Collisions referring to different inputs resulting in exact same outputs (output being the actually 32 byte hex sequence).
Programs exist, not to reverse an MD5, but to search for collisions, resulting in the same hash signature, thus circumventing the protection. Therefore any data that is protected using MD5 while 99.99% safe, occasions do occur where your signature will be duplicated and thu compromised.
Moreover, any smart cracker could simply remove the function that performs the MD5 check and consequently remove the protection.
|
|
| Back to top |
|
 |
UnLmtD Grandmaster Cheater
Reputation: 0
Joined: 13 Mar 2007 Posts: 894 Location: Canada
|
|
| Back to top |
|
 |
appalsap Moderator
Reputation: 0
Joined: 27 Apr 2006 Posts: 6753 Location: Pakistan
|
Posted: Sat Jun 30, 2007 9:02 pm Post subject: |
|
|
Ouch Didn't even entertain the possibility of his plagiarizing that small function.
|
|
| Back to top |
|
 |
HomerSexual Grandmaster Cheater Supreme
Reputation: 5
Joined: 03 Feb 2007 Posts: 1657
|
Posted: Sat Jun 30, 2007 9:14 pm Post subject: |
|
|
never said i made the functions or CRYPTAPI
i just said
it used cryptapi
its free open source code
gg
edit:
i just found the code and utilized it
if you post code on the net credits do NOT have to be given unless noted
You cannot say it is your code though, which i never did
_________________
|
|
| Back to top |
|
 |
|