#11
|
||||
|
||||
being an it geek i have allways used different passwords for all things of importance e.g accounts with admin access etc.
what most dont realise is that the poeple who own/run forums can retrieve a users password if they know how to open up the correct table and extract the data. I suspect the attack was from a person that had full access to another forum database to extract the password that chris used. unfortunatly chris's password was the same on all forums and unfortunatly on this forum it was an admin account. |
#12
|
|||
|
|||
Quote:
|
#13
|
|||
|
|||
Would that apply to all systems, though, even if they were quite old?
|
#14
|
|||
|
|||
Pretty much every system I've used in the last 10 years does it that way, it's not exactly new technology! In fact, I say 'pretty much', but I can't think of a single exception.
|
#15
|
||||
|
||||
There is at least one forum i'm on that doesn't use the new tech. But yes most of them do encrypt the info.
|
#16
|
||||
|
||||
i have done a lot of work on sql databases in my time and the encryptions are not hard to get around if you know what you are doing.
i run a phpbb forum and have got users passwords out of the tables and decrypted them when they have forgot thir passwords. takes about 5mins if you have the correct tools. Last edited by AshG : 7th August 2009 at 01:38 PM. |
#17
|
|||
|
|||
Quote:
Pretty much any PHP+MySQL web application will use either md5 or SHA1 to secure the passwords in the database. Whilst md5 has been shown to be insecure, it's not a trivial job to crack it, and only works in a limited number of cases. For the level of security required for sites like this, I would personally consider it perfectly secure enough, but I wouldn't want to send my credit card number in public view using it. It's also easier on the CPU than SHA1, so on a busy site it could improve performance. SHA1 again has weaknesses in a tiny number of cases. I've yet to see a hack attempt on any system I've worked on that relied on a weakness in it, and if they guys I have to defend against don't know how to do it, nobody does. It is heavier on the CPU though, which is why most sites will stick with md5. In short, if you can decode someone's password in a few minutes then your implementation is either stupidly out of date or has been written by a complete idiot. Last edited by thewinker : 7th August 2009 at 01:21 PM. |
#18
|
||||
|
||||
now now, play nice...
__________________
http://www.flickr.com/photos/3326151...7611049241239/ |
#19
|
||||
|
||||
I think it's best that we leave this topic and move on, what's done is done and this discussion is just raking it all up.
Cheers Chris |
#20
|
||||
|
||||
I like the new Avitar Chris
Any news on the release date for the new book
__________________
I am not a complete idiot...........Some of the parts are missing !! Ronnie www.roadster-builders.co.uk |
Thread Tools | |
Display Modes | |
|
|