tansqrx 0 Report post Posted April 27, 2005 I have recently been playing around with rainbow tables. If you don't know what they are then look at http://forums.xisto.com/no_longer_exists/ They are basically a precomplied hash table of all possible values from a particular algorithm. The most common are for the Windows Lanman hashes which can crack any possible Windows SAM in little to no time. My question is are there similar tables circulating for MD5? I got the Windows tables from bit torrent which were around 12 Gb compressed and 64 uncompressed. Share this post Link to post Share on other sites
marijnnn 0 Report post Posted April 28, 2005 yep, the idea is the same. they don't actuall crack it. they just try out any string and take the hash of it. it's ok if you know that the word you are looking for is about 8 letters long, a password or so, but it might as well be something completely different. besides, if you hash it twice, no way they'll find it...it's kinda stupid i think. Share this post Link to post Share on other sites
tansqrx 0 Report post Posted April 28, 2005 Stupid? No way, there are still plenty of applications out there that use a MD5 hash and a plain MD5 hash at that. I agree, hashing twice or adding a seed value will throw off the rainbow tables, but as I said there are still plenty of apps that this would be useful against. Share this post Link to post Share on other sites
SubTen 0 Report post Posted May 27, 2005 But hashing twice won't necessarily do anything security-wise. Since a hash can have multiple corresponding passwords any password that creates the same hash is a correct password. Hashing twice only keeps someone from getting the original password. Share this post Link to post Share on other sites
iGuest 3 Report post Posted February 26, 2008 Replying to SubTenNo, actually, even if you hash it twice, you can still crack it pretty easily with rainbowtables. Share this post Link to post Share on other sites
naro2212 0 Report post Posted March 17, 2008 yea you can hack it easly wiht rainbow tabs in my opion we should develept finger print scaners as passwords Share this post Link to post Share on other sites
docduke 0 Report post Posted March 19, 2008 There is a Live CD version of Rainbow Tables, called OPHcrack. It is discussed in DistroWatch, which is where I first heard of it. It is imbedded in a copy of Slackware Linux.I tried it on Windows XP, on a system which had 4 user accounts. It cracked only one of them, which had an all-uppercase 8-character alphabetic password.This is neither a testimonial nor a complaint. I had never before heard of Rainbow Tables, and was curious what they could do. If you wish to try them out, a Live CD is certainly a simple way to do it. In praise of OPHcrack, I booted it on a computer that has 4 hard drives. It correctly identified the 4 Windows partitions, and let me tell it which one to attack. Share this post Link to post Share on other sites
tansqrx 0 Report post Posted April 1, 2008 yea you can hack it easly wiht rainbow tabs in my opion we should develept finger print scaners as passwordsItâs funny that you mention using your fingerprints as passwords. Today I read an article where hackers have basically made a fingerprint keylogger. http://www.darkreading.com/default.aspIf you think biometric scans are necessarily secure, think again: A European researcher has built a biometric keylogger that can capture fingerprint or other scans. Share this post Link to post Share on other sites
iGuest 3 Report post Posted March 14, 2009 questionMd5 Rainbow Tablesis there a site which can convert LN hashes to text online? Please reply Share this post Link to post Share on other sites
Atomic0 0 Report post Posted May 29, 2009 You might want to try the database hosted at: http://finder.insidepro.com/If you can't find your password / hash set in the database, you may want to try posting at: https://forum.insidepro.com/index.php?c=3to get some password recovery assistance for free. Share this post Link to post Share on other sites
iGuest 3 Report post Posted March 7, 2011 md5*2 wont save youMd5 Rainbow Tablessay someone breaks into your database and steals all the passwords but you passwords are md5(md5($password)); well the already have the outcome of that from getting the password now if they have a big enough rainbow db they can just look up the hash they have it will give them the second hash then they look that up and they have the password if you really want to keep your stuff safe use 2 different types of cryptology and a salt-reply by Graham Share this post Link to post Share on other sites