Subject Re: [IBO] Asta or Direct IP
Author Jason Wharton
Also don't forget that you don't even need the original password. Is all you
need is an alternative or the original that results in the same encrypted
bytes.

Jason Wharton
CPS - Mesa AZ
http://www.ibobjects.com


----- Original Message -----
From: "Dalton Calford" <dcalford@...>
To: <IBObjects@yahoogroups.com>
Sent: Thursday, May 31, 2001 7:17 AM
Subject: Re: [IBO] Asta or Direct IP


> BTW, don't trust that the lossy routines within MD5 can not be
circumvented
> allowing you to come up with a short list of possible origional hash
seeds.
> (this is very possible)
>
> best regards
>
> Dalton
>
> On Thursday 31 May 2001 09:34, you wrote:
> > How is MD5 used to *decode* anything? It is a one-way hash algorithm.
I
> > know this is kind of off-topic, but I don't understand this part of the
> > solution.
> >
> > At 12:19 PM 5/30/2001 -0400, you wrote:
> > >The stored procedure takes the username, password and role as
parameters
> > > and first decodes them using the md5hash routines. (plus bin_xor) or
> > > simple pattern matching.
> > >(This is also a very detailed subject, for another email)
> >
> > Your use of Yahoo! Groups is subject to
http://docs.yahoo.com/info/terms/
>
>
>
> Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
>
>