This is easy - Use a rainbow table!garvinhicking wrote:Ha. Wait.
We can't update the MD5 hashes, because we don't know the passwords of the users.
Passwords are pure MD5-Hashes?!
-
stm999999999
- Regular
- Posts: 1531
- Joined: Tue Mar 07, 2006 11:25 pm
- Location: Berlin, Germany
- Contact:
Re: Passwords are pure MD5-Hashes?!
Ciao, Stephan
-
williamts99
- Regular
- Posts: 30
- Joined: Sat Dec 10, 2005 11:50 pm
- Contact:
Re: Passwords are pure MD5-Hashes?!
Sadly that would take care of almost everyone's password. I agree that it should of course be salted. Though the best thing is for people to use unique passwords for each and every site. I happen to use http://passwordmaker.sourceforge.net/ so that no two passwords are ever the same. If your site gets hacked and exposes unsalted hashes of the users which then can easily found with rainbow tables, very bad for the users. The best idea is to salt the already calculated hash into the new saltedhash. The downside is having to always hash twicestm999999999 wrote:This is easy - Use a rainbow table!garvinhicking wrote:Ha. Wait.
We can't update the MD5 hashes, because we don't know the passwords of the users.
For example my password = password and username = username
Existing hash is for "password"
Code: Select all
5f4dcc3b5aa765d61d8327deb882cf99Then you use the following to generate the new hash
Code: Select all
5f4dcc3b5aa765d61d8327deb882cf99usernameCode: Select all
6af64e847a8654895b0136437e100bbcUnfortunately for people that use the same passwords for all of their accounts it doesn't protect against 'honey pot' sites that are set up to store the passwords in plain text and then they use those to try and access your other accounts on other sites.
As far as moving away from md5, I can't see any reason to do so. I believe the chances of a collision is too slim for this implementation.