Hacking and "Amateurism"
Joachim Richter
richter at immd4.informatik.uni-erlangen.de
Tue Apr 16 22:12:18 AEST 1991
In article <JASON.91Apr10225530 at lancelot.cs.odu.edu> jason at cs.odu.edu (Jason "dedos" Austin) writes:
>
> It's not too hard to show that it is possible to decode a
>password. Every time the same salt and the same password is run
>through the crypt function, the same code comes out.
>(It would have to
>or the thing wouldn't work at all) At the worst case, an exhaustive
>table from coded to decoded passwords woul; give right answers. Even
>if the relation is not 1-1 and each code has more than one possible
>decoding, any of the valid decodings would let you log in. Of course,
>this would be quite a large table to calculate considering all the
>permutations.
>--
>Jason C. Austin
>jason at cs.odu.edu
Right. Of course you can do that.
You can also, for a given object file, find the source code,
that, when compiled, gives that object code that way. No problem.
Maybe it will take a while - some millions of years or so.
But, since the number of source codes, that give the same object code
is infinite, your chance is not so bad :-)
More information about the Comp.unix.wizards
mailing list