Are you sure the one is crypted? I was under the impression that the mud passwords where encrypted in same way as system passwords... ie a one-way salted algorithm. And if they were like that, you'd need some major CPU power and a hope that all the passwords were in a dictionary file and you cached the results of crypting all of those with the 64(?.. don't remember)different salts. cracking the crypted password is pretty impractacle within a mud code-base(even though it would be nice to have an SMP Alpha to try it on..-=:)..) I think the passwords on the one mud were plain-text... If you really want to try against the crypted ones, get a copy of Crack by Alex Muffet... the docs explain how the encryption works... and, of course, I could be completely wrong... ed -----Original Message----- From: Chuck Reed <master@I-55.COM> To: CIRCLE@post.queensu.ca <CIRCLE@post.queensu.ca> Date: Tuesday, August 25, 1998 11:45 PM Subject: [SILLY QUESTION] Uncrypting passwords >I'm working on two different places right now, and I wrote some code to >show imps the password of any player in the game for one of them. In my >transfering of the code to the second mud, the GET_PASSWD(ch) and >chdata.pwd return the crypted passwords. This was not the case for the >first mud, but both use password encryption. I'm guessing that since one >is FreeBSD and the other is Linux (redhat 4.0 i think), that the encryption >is a ton different. What I'm asking is where I could find a way to DEcrypt >the password string. > >Chuck > > > +------------------------------------------------------------+ > | Ensure that you have read the CircleMUD Mailing List FAQ: | > | http://democracy.queensu.ca/~fletcher/Circle/list-faq.html | > +------------------------------------------------------------+ +------------------------------------------------------------+ | Ensure that you have read the CircleMUD Mailing List FAQ: | | http://democracy.queensu.ca/~fletcher/Circle/list-faq.html | +------------------------------------------------------------+
This archive was generated by hypermail 2b30 : 12/15/00 PST