Author | Post | |||
BaRa![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
@Z: That is the funniest use of ettercap I have ever heard. Nice example. |
|||
![]() |
|
|||
alt3rn4tiv3![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
For those who don't know, I've set up a blog (expect it to be down soon - the webhost [FastNext] is rubbish and I'm moving host very soon) at http://altblog.searix.net/ - inspired by rhican. Well anyway, I bet hardly anyone here would have heard / thought that MySQL as a password-cracking engine. For example, ![]() create table ch(c char); insert into ch values('a'), ('b'), ('c'), ('d'), ('e'), ('f'), ('g'), ('h'), ('i'), ('j'), ('k'), ('l'), ('m'), ('n'), ('o'), ('p'), ('q'), ('r'), ('s'), ('t'), ('u'), ('v'), ('w'), ('x'), ('y'), ('z'); select * from ch a, ch b, ch c, ch d where sha1(concat(a.c,b.c,c.c,d.c)) = '81fe8bfe87576c3ecb22426f8e57847382917acf' Will result in the sha1 hash being cracked (it's actually "abcd"). You can actually use this concept for other purposes. But I don't think I'd want to mention it here. Maybe check my blog in future. I might post it there. ![]() |
|||
Edited by alt3rn4tiv3 on 03.10.2007 07:20:36 | ||||
![]() |
|
|||
unknown user |
. |
|||
23.01.2008 11:57:18 |
|
|||
Kender![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Even more "lightweight" is SandBoxie ( ![]() Looks interesting but haven't tried it yet. |
|||
![]() |
|
|||
unknown user |
. |
|||
09.02.2008 16:40:20 |
|