Online Users Page


QN

Previous notifications:
4 years ago
New Blog Entry In .:A-MAN:. lists stuff!
11 years ago
Regular accepted your friend request
More..
62umer936
11 years ago
Wanna know a secret?
Any of y'all remember Confuzzle? No?
Well it was basically the site of @maniakk and I years ago when we were first attempting to learn PHP. Anyways, when we first started, maniakk got the login stuff working and I was confused why it stored to the DB in plaintext. Then I found out about hashes and encryption, so I cleared the passwords column before taking a backup. The site later went to the drain and I ended up making Compass, which had 4 crypts all stacked together (with crypted hashes too) because I realized that many sites in the community probably store passwords in plaintext as I first did.

Imagine if I didn't clear the passwords. I could have many of you guys' passwords, but my morals get in the way of any "evil" I could ever do with them xD
Back

Please Login To Post

34kenw2 11 years ago
Lol
Reply
18607jf 11 years ago
Well, that escaladed quickly.
Reply
62umer936
11 years ago
Reply
34kenw2 11 years ago
Nope. I will never tell.
Plus adding 3 numbers after your password on klub didn't help.
Reply
62umer936
11 years ago
@kenw2
I... but.... wha... how?!
Reply
34kenw2 11 years ago
You used salman as your password on klub until you changed it.

I have my ways.
Reply
62umer936
11 years ago
@kenw2
How did you get that?!
It's Salm@n12345. Only reason I'm saying it is because I retire my passwords after a while and Compass is dead, so password=dead.
Reply
34kenw2 11 years ago
Salman? I doubt you would use your last name though.
Reply
62umer936
11 years ago
I used something like this: hash1(hash2(hash3(...hashn(pass+salt)+pass+salt)+pass+salt)...)+pass+salt)

oh, and I had a different salt for each level

(from @Abu's link)
Reply
62umer936
11 years ago
This was my password on Compass:
b98235b1316dd1c8d6058d64ebd6db8f9b1553b6137a15f7b43c7fc412f9222687d1a34193e68b2fa9363e56410d491b0aceded9e7f155b3868e7d304d03aedc


Good luck. If you can get my password out of that, I applaud you!
Reply
17X27
11 years ago
When you said you had random hashes I took it as a randomly generated amount of hashes, and a random salt generator with the decryption information encrypted xD

My brain doesn't accept K.I.S.S. xD
Reply
33Abu 11 years ago
Reply
16Alyx 11 years ago
A good 90% of the community doesn't use the same passwords from other websites. You won't find one password I have that matches except for this site, cause I obviously trust Anthony.
Reply
62umer936
11 years ago
@Abu

Are you sure? That seems counter-intuitive.

If someone were trying to rainbow table the DB, they'd have to do the first SHA-256 (with the salt), THEN the whatever encryption I used next, and so on until they could maybe, possibly get it in a couple centuries
Reply
33Abu 11 years ago
Ah Owen Boyd!
By the way using multiple hashes doesn't make your has stronger, only weaker.
Reply
v3.2