Anope IRC Services

Anope Support => 1.6.x (Read Only) => Topic started by: Xeon on February 12, 2006, 07:35:51 PM

Title: Recovering ns passwords when encrypted
Post by: Xeon on February 12, 2006, 07:35:51 PM
Is there a way to recover nickname passwords when your database is encrypted?  Why doesn't anope provide a mechanism to reverse hash the nicknames if the database is encrypted?

At any rate, I'd like to hear from someone on whether or not there is a way for me to recover these passwords.

Thanks for your help in advance.
Post by: Dave Robson on February 12, 2006, 07:39:00 PM
There isnt.  We use one way encryption, it isnt a case of "not providing it" its a case of "not possible"
Post by: Pieter Bootsma on February 12, 2006, 07:39:19 PM
This is impossible. Hash algorithms like MD5 are based on the idea that the hash cannot be reverted, so it doesn't hurt if someone else manages to get hold of the hash.
Post by: owine on February 12, 2006, 09:11:31 PM
you can just use /nickserv saset nick password to reset the pass. no need for recovery.
Post by: Xeon on February 13, 2006, 03:01:28 AM
Yeah that's what I thought!

Thanks for the suggestion owine!
Title: its not impossible
Post by: binarygenius on May 19, 2006, 03:05:20 PM
if you need to recover a md5 hash you can brute force it using md5crack i have`nt looked into the anope hashes yet but if they use salts then you will have to find the salt aswell and set that up on the cracker but if the password is longer than 8 letters your in for a very long cracking session also if it uses letters numbers and symbols forget it if it is only a lowercase password try using rainbow tables same goes for DES, SHA1,LM,SAM
Post by: Trystan Scott Lee on May 19, 2006, 06:50:19 PM
anope's md5 are some what broken, so to break them you would have to have a cracker that is just as broken