so the password is hashed. how to make post request with this post data. do i simply put password string (non hashed)?
hashed Post Data
#1
Posted 06 September 2018 - 03:46 PM
[NULLED BEST] Config Making Service (OPENBULLET, STORM, MBA)
[LEGENDARY] MadmanDev's Config Shop (250+ HQ and Private Configs)
JOIN TELEGRAM CHANNEL CLICK HERE
Discord: madmandev#3281 Telegram: @madmandev
#2
Posted 12 September 2018 - 03:28 PM
That won't work, you have to hash it like the website. If you know how to use hashes in web-development you should know how storing hashed passwords work.
If you register a account on a website which is hashing their passwords, it will look like this:
Register Form:
Username/Email
Password
Button(Register)
The system hashes the password and only saves that hash! not the password!
And the login system looks like this:
Username/Email
Password
Button(Login)
Now the system hashes the password again and only look for the username and the hash, and if its matching, you successfully logged in.
#3
Posted 08 November 2018 - 08:57 PM
That won't work, you have to hash it like the website. If you know how to use hashes in web-development you should know how storing hashed passwords work.
If you register a account on a website which is hashing their passwords, it will look like this:
Register Form:
Username/Email
Password
Button(Register)
The system hashes the password and only saves that hash! not the password!
And the login system looks like this:
Username/Email
Password
Button(Login)
Now the system hashes the password again and only look for the username and the hash, and if its matching, you successfully logged in.
Bullshit, request here just crypt the password via JS in sha512 (idk why) and then make the post.
That's all so in your software that you are making crypt the password to sha512, store it and then make the request with this sha512 pass
putting non hashed password wont work cuz it want an hashed pass
not too complicated guys just check here ...
password you used here is "mypasss" once decrypted...Edited by KiiRanT, 08 November 2018 - 08:59 PM.
#4
Posted 13 November 2018 - 10:46 PM
Bullshit, request here just crypt the password via JS in sha512 (idk why) and then make the post.
That's all so in your software that you are making crypt the password to sha512, store it and then make the request with this sha512 pass
putting non hashed password wont work cuz it want an hashed pass
not too complicated guys just check here ...
password you used here is "mypasss" once decrypted...
how u unhash it bro i m new to cracking can u tell how to unhash passwords?
#5
Posted 13 November 2018 - 10:51 PM
Bullshit, request here just crypt the password via JS in sha512 (idk why) and then make the post.
That's all so in your software that you are making crypt the password to sha512, store it and then make the request with this sha512 pass
putting non hashed password wont work cuz it want an hashed pass
not too complicated guys just check here ...
password you used here is "mypasss" once decrypted...
before you call what someone says bullshit please do read what they say.
@OP
find whatever hashing algorithm the back-end uses, fill out the other forms as required, hash the given password, insert it into the password key and send it.
'unhashing' or cracking the hash is theoretically computationally impossible for most hashing algorithms nowadays, most people use offline or online rainbow tables/hash indexing services to reveal what a hash's original value was.
a hash is primitively one-sided and fully lossful, due to the secure nature of its actual algorithm.
Contact for professional programming services.
6+ years desktop application development experience.
Python and C, reverse engineering experience on x86{-64} native binaries.
Versed in penetration testing, CompTIA Network+ certified.
Discord: xchg#5401
Your one-stop-shop for homework help: PaperPeers.com
Users browsing this thread: