Subject | RE: [IB-Architect] The Borland Back Door |
---|---|
Author | Jim Starkey |
Post date | 2001-01-11T15:31:26Z |
At 02:38 PM 1/11/01 +0100, Tobias Giesen wrote:
low order bits of the key and a given salt to generate a DES
key which encrypts a known string. The Linux man pages suggests
that if you're planning to use crypt(), get a book on encryption
and use something better.
Jim Starkey
>> Which means you can connect to the ISC4.GDB and readIt uses the standard Unix crypt() function. Crypt uses the 7
>> the USERS table, including encrypted copies of all the
>> passwords.
>
>How are they encrypted? Has the source code of the encryption been
>published? Probably dead easy to decrypt them using code from open-source
>IB?
>
low order bits of the key and a given salt to generate a DES
key which encrypts a known string. The Linux man pages suggests
that if you're planning to use crypt(), get a book on encryption
and use something better.
Jim Starkey