• There is NO official Otland's Discord server and NO official Otland's server list. The Otland's Staff does not manage any Discord server or server list. Moderators or administrator of any Discord server or server lists have NO connection to the Otland's Staff. Do not get scammed!

Passwords Problem With "Sha1"

Hrsha

Member
Joined
May 30, 2010
Messages
450
Reaction score
21
Location
Egypt
Hi otland

i have problem with sha1 which i cant read passwords of accounts
and it deny to have full control as manager of ot

so is there any way to make full plain ot ? with acc ?
iam using modern acc 0.6.2 or is there a way to read sha1 passwords ?

.. thanks
 
Why do you want to be able to read the passwords? gonna try hacking or what?...
there's no reason for the owner having the passwords in plain text.
 
The point of sha1 is that you can't read the password. Whenever your database gets exposed the passwords are at least behind a tiny hash (which is actually "decodable" with rainbow tables).
There's no need to change it.
 
they are breakable, using current technology you can break md5/sha1 passowrds with a speed of several hundreds millions of passwords per second with a single graphic card... imagine what you can do with a cluster...
 
From what I've read you can't really decrypt sha-1... Then again there might be ways, you'd have to look deep into the internets.

No, you can't decrypt it.

There are databases with millions of string-sha1 pairs. (rainbow tables)

Example:
sha1("hi") ====> c22b5f9178342609428d6f51b2c5af4c0bde6a42
sha1("hii") ====> 650f97e596e63e92d9447619d38e8a83e0bec8b9

Guess what c22b5f9178342609428d6f51b2c5af4c0bde6a42 means.
 
No, you can't decrypt it.

There are databases with millions of string-sha1 pairs. (rainbow tables)

Example:
sha1("hi") ====> c22b5f9178342609428d6f51b2c5af4c0bde6a42
sha1("hii") ====> 650f97e596e63e92d9447619d38e8a83e0bec8b9

Guess what c22b5f9178342609428d6f51b2c5af4c0bde6a42 means.

c22b5f9178342609428d6f51b2c5af4c0bde6a42 SHA1 : hi

I found an online decoder...
 
"I like this thread very much!" Does that sound about right?

Since he used the same (probably) website as you did to generate the Sha1, it got added to their database so you can decode it...

Try this, encoded using the original php function: 31f44fdda9530cc65ae372c378ac6be88e55d128.
 
Since he used the same (probably) website as you did to generate the Sha1, it got added to their database so you can decode it...

Try this, encoded using the original php function: 31f44fdda9530cc65ae372c378ac6be88e55d128.
YEYE


@no one in particular, just an example of me not giving into a public faggotry site to generate :p
PHP:
<?php
  echo hash("sha512", "Enjoy being a massive faggot");
?>

ITT: We go offtopic since OP has already been answered
 
Not trying to make this a I can prove you right, yes Slurp and TGYoshi it didn't find the hashes, I wont deny that but there still are tools that can be used. Not ALL hashes are undecypherable. :L
 
Not trying to make this a I can prove you right, yes Slurp and TGYoshi it didn't find the hashes, I wont deny that but there still are tools that can be used. Not ALL hashes are undecypherable. :L
GLHFLOLOFL

Stop using shitty sites and do it manually. Then your face when you will realize how long it takes to decrypt something competent, just to find out it was wrong in the end.

If you want to brute force, I recommend a 7970 or I think the 5970 is better or at par
 
Last edited:
Not trying to make this a I can prove you right, yes Slurp and TGYoshi it didn't find the hashes, I wont deny that but there still are tools that can be used. Not ALL hashes are undecypherable. :L

All hashes are not decryptable.

Just use your single brain cell to imagine how it's done:
If some user like you goes to a website to generate a sha1 hash. The website tells you that the sha1 of hi => c22b5f9178342609428d6f51b2c5af4c0bde6a42. The website remembers that in a so-called database.
Whenever someone goes to the same website to 'decrypt' a hash, it'll say that c22b5f9178342609428d6f51b2c5af4c0bde6a42 means hi, because the website 'remembered' the first process...

If you still don't understand it I conclude you're either a troll or I'll give up on you.
 
Give up on me because I am a troll? But no seriously I've tried it on 2-3 different decoders and they all came out with the same output data.
 
Back
Top