Anope IRC Services

Please login or register.

Login with username, password and session length
Advanced search  

News:

Pages: [1]   Go Down

Author Topic: Recovering ns passwords when encrypted  (Read 6255 times)

0 Members and 1 Guest are viewing this topic.

Xeon

  • Guest
Recovering ns passwords when encrypted
« on: February 12, 2006, 07:35:51 PM »

Is there a way to recover nickname passwords when your database is encrypted?  Why doesn't anope provide a mechanism to reverse hash the nicknames if the database is encrypted?

At any rate, I'd like to hear from someone on whether or not there is a way for me to recover these passwords.

Thanks for your help in advance.
Logged

Dave Robson

  • Team
  • *
  • Offline Offline
  • Posts: 357
(No subject)
« Reply #1 on: February 12, 2006, 07:39:00 PM »

There isnt.  We use one way encryption, it isnt a case of "not providing it" its a case of "not possible"
Logged

Pieter Bootsma

  • Team
  • *
  • Offline Offline
  • Posts: 189
    • http://geniusdex.net/
(No subject)
« Reply #2 on: February 12, 2006, 07:39:19 PM »

This is impossible. Hash algorithms like MD5 are based on the idea that the hash cannot be reverted, so it doesn't hurt if someone else manages to get hold of the hash.
Logged

owine

  • Anope User
  • Offline Offline
  • Posts: 130
(No subject)
« Reply #3 on: February 12, 2006, 09:11:31 PM »

you can just use /nickserv saset nick password to reset the pass. no need for recovery.
Logged

Xeon

  • Guest
(No subject)
« Reply #4 on: February 13, 2006, 03:01:28 AM »

Yeah that's what I thought!

Thanks for the suggestion owine!
Logged

binarygenius

  • Guest
its not impossible
« Reply #5 on: May 19, 2006, 03:05:20 PM »

if you need to recover a md5 hash you can brute force it using md5crack i have`nt looked into the anope hashes yet but if they use salts then you will have to find the salt aswell and set that up on the cracker but if the password is longer than 8 letters your in for a very long cracking session also if it uses letters numbers and symbols forget it if it is only a lowercase password try using rainbow tables same goes for DES, SHA1,LM,SAM
Logged

Trystan Scott Lee

  • Contributor
  • *
  • Offline Offline
  • Gender: Male
  • Posts: 343
(No subject)
« Reply #6 on: May 19, 2006, 06:50:19 PM »

anope's md5 are some what broken, so to break them you would have to have a cracker that is just as broken
Logged
my God my tourniquet, return to me salvation
Pages: [1]   Go Up