View Single Post
  #30  
Old 19th June 2008, 16:39
djlee's Avatar
djlee djlee is offline
Senior Member
 
Join Date: Mar 2008
Posts: 183
Default Re: TS SE v5.0 Nulled by mrdecoder (not decoded)
no u cant.. a dictionary attack wouldnt word as im guessing even xam has the common sense to use a secure password

that leaves u with a brute force attack.. given the current power and available resources to the average computer today .. the process of unhashing an md5 hash would take far longer than the life span of the computer .. and most likely the life span of yourself too (given that the password would not be just a few characters in length.. obviously a brute force on a 1 or 2 character password would be possible .. i think its when u exceed 4 or 6 your looking at the almost impossible)

obviously there are online databases .. but the chances are you want find it in there.

now the problem becomes even more apparant when using salt or even random generated salts. if he is using a random salt or the default length salt as set in the original source your looking at the length of his password plus the length of the salt which i think is 10 characters aint it .. so ur looking at a minimum of 16 chars id reckon.

so basically unless u own a supercomputer with a few thousand cpu's or u happen to work at a university where you can combine the resources of the entire LAN network for the cracking attempt its impossible
Reply With Quote