Are you sure the one is crypted? I was under the impression that the mud
passwords where encrypted in same way as system passwords... ie a one-way
salted algorithm. And if they were like that, you'd need some major CPU
power and a hope that all the passwords were in a dictionary file and you
cached the results of crypting all of those with the 64(?.. don't
remember)different salts. cracking the crypted password is pretty
impractacle within a mud code-base(even though it would be nice to have an
SMP Alpha to try it on..-=:)..)
I think the passwords on the one mud were plain-text...
If you really want to try against the crypted ones, get a copy of Crack by
Alex Muffet... the docs explain how the encryption works...
and, of course, I could be completely wrong...
ed
-----Original Message-----
From: Chuck Reed <master@I-55.COM>
To: CIRCLE@post.queensu.ca <CIRCLE@post.queensu.ca>
Date: Tuesday, August 25, 1998 11:45 PM
Subject: [SILLY QUESTION] Uncrypting passwords
>I'm working on two different places right now, and I wrote some code to
>show imps the password of any player in the game for one of them. In my
>transfering of the code to the second mud, the GET_PASSWD(ch) and
>chdata.pwd return the crypted passwords. This was not the case for the
>first mud, but both use password encryption. I'm guessing that since one
>is FreeBSD and the other is Linux (redhat 4.0 i think), that the encryption
>is a ton different. What I'm asking is where I could find a way to DEcrypt
>the password string.
>
>Chuck
>
>
> +------------------------------------------------------------+
> | Ensure that you have read the CircleMUD Mailing List FAQ: |
> | http://democracy.queensu.ca/~fletcher/Circle/list-faq.html |
> +------------------------------------------------------------+
+------------------------------------------------------------+
| Ensure that you have read the CircleMUD Mailing List FAQ: |
| http://democracy.queensu.ca/~fletcher/Circle/list-faq.html |
+------------------------------------------------------------+
This archive was generated by hypermail 2b30 : 12/15/00 PST