Page 1 of 2
SHA-1 "cracked"
Posted: Sun Jan 21, 2007 7:42 pm
by Jenk
Posted: Sun Jan 21, 2007 7:51 pm
by Luke
Wang Xiaoyun is a pretty impressive woman. She's a crackin fool!

Posted: Sun Jan 21, 2007 8:20 pm
by daedalus__
That woman is simply amazing. I wonder what she looks like.

Posted: Sun Jan 21, 2007 8:44 pm
by aaronhall
Posted: Sun Jan 21, 2007 8:46 pm
by Luke
"Hey baby, wanna do some math?"

Posted: Sun Jan 21, 2007 9:45 pm
by aaronhall
Tappin dat hash
Posted: Sun Jan 21, 2007 10:25 pm
by m3mn0n
haha! Nice one.
Pretty impressive work.
Posted: Mon Jan 22, 2007 1:42 am
by daedalus__
After a forty, I probably would too.
Posted: Mon Jan 22, 2007 3:04 am
by Maugrim_The_Reaper
On topic... I wonder how many here are still using SHA-1?
Posted: Mon Jan 22, 2007 3:09 am
by Luke
I use sha-1 to hash passwords
Posted: Mon Jan 22, 2007 6:12 am
by m3mn0n
I know a lot of people simply using md5 still.
Posted: Mon Jan 22, 2007 6:16 am
by Jenk
I use md5 still. Reasons being they are all at a level of security. Even if they are "hacked" they still take a lot of computation to do so, and because I use salts I'm not overtly worried that someone will spend hours upon hours trying to "decipher" my salts/md5 just to gain access to someone's blog..
Posted: Mon Jan 22, 2007 6:34 am
by aaronhall
I use MD5 on evilwalrus -- if someone does manage to get into the server, it would take them about 25 seconds to change the authentication logic and gain access to any account. When I'm working databases containing nuclear launch codes or government bank account information, I generally use sha256 or better. Otherwise, I find anything >sha1 kind of arrogant

Posted: Mon Jan 22, 2007 11:59 am
by Kieran Huggins
too true - security is subjective!
Posted: Mon Jan 22, 2007 12:14 pm
by RobertGonzalez
You guys are a bunch of freaks!
/ contemplates the eroticism of moaned hash algorithm values...