ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!

Jump to content



Photo

hashed Post Data


  • Please log in to reply
hashed Post Data

#1

MadmanDev
MadmanDev
    Offline
    133
    Rep
    798
    Likes

    madmandev#3281

  • PipPipPipPipPipPipPip
Posts: 1739
Threads: 348
Joined: Jun 22, 2017
Credits: 0

Deal with caution
User has an open scam report.
Six years registered
#1

Please Login or Register to see this Hidden Content

so the password is hashed. how to make post request with this post data. do i simply put password string (non hashed)? 


  • 1

#2

QualityUser
QualityUser
    Offline
    1
    Rep
    3
    Likes

    Quality Control Officer

Posts: 16
Threads: 0
Joined: Sep 11, 2018
Credits: 0
Five years registered
#2

That won't work, you have to hash it like the website. If you know how to use hashes in web-development you should know how storing hashed passwords work.

 

If you register a account on a website which is hashing their passwords, it will look like this:

 

Register Form:

 

Username/Email

 

Password

 

Button(Register)

 

The system hashes the password and only saves that hash! not the password!

 

And the login system looks like this:

 

Username/Email

 

Password

 

Button(Login)

 

Now the system hashes the password again and only look for the username and the hash, and if its matching, you successfully logged in.


  • 0

#3

KiiRanT
KiiRanT
    Offline
    1
    Rep
    23
    Likes

    革命

Posts: 406
Threads: 13
Joined: Oct 29, 2018
Credits: 0

Five years registered
#3

That won't work, you have to hash it like the website. If you know how to use hashes in web-development you should know how storing hashed passwords work.

 

If you register a account on a website which is hashing their passwords, it will look like this:

 

Register Form:

 

Username/Email

 

Password

 

Button(Register)

 

The system hashes the password and only saves that hash! not the password!

 

And the login system looks like this:

 

Username/Email

 

Password

 

Button(Login)

 

Now the system hashes the password again and only look for the username and the hash, and if its matching, you successfully logged in.

Bullshit, request here just crypt the password via JS in sha512 (idk why) and then make the post.

That's all so in your software that you are making crypt the password to sha512, store it and then make the request with this sha512 pass

putting non hashed password wont work cuz it want an hashed pass

 

not too complicated guys just check here ... 

Please Login or Register to see this Hidden Content

password you used here is "mypasss" once decrypted...


Edited by KiiRanT, 08 November 2018 - 08:59 PM.

  • 0

#4

erica99
erica99
    Offline
    2
    Rep
    11
    Likes

    Junkie

  • PipPipPipPipPipPip
Posts: 391
Threads: 32
Joined: Sep 06, 2018
Credits: 0
Five years registered
#4

Bullshit, request here just crypt the password via JS in sha512 (idk why) and then make the post.

That's all so in your software that you are making crypt the password to sha512, store it and then make the request with this sha512 pass

putting non hashed password wont work cuz it want an hashed pass

 

not too complicated guys just check here ... 

Please Login or Register to see this Hidden Content

password you used here is "mypasss" once decrypted...

how u unhash it bro i m new to cracking can u tell how to unhash passwords?


  • 0

#5

unazed
unazed
    Offline
    31
    Rep
    126
    Likes

    https://rari.su

Posts: 285
Threads: 29
Joined: Sep 17, 2018
Credits: 0

Five years registered
#5

Bullshit, request here just crypt the password via JS in sha512 (idk why) and then make the post.

That's all so in your software that you are making crypt the password to sha512, store it and then make the request with this sha512 pass

putting non hashed password wont work cuz it want an hashed pass

 

not too complicated guys just check here ... 

Please Login or Register to see this Hidden Content

password you used here is "mypasss" once decrypted...

 

before you call what someone says bullshit please do read what they say.

 

@OP

 

find whatever hashing algorithm the back-end uses, fill out the other forms as required, hash the given password, insert it into the password key and send it.

'unhashing' or cracking the hash is theoretically computationally impossible for most hashing algorithms nowadays, most people use offline or online rainbow tables/hash indexing services to reveal what a hash's original value was.

 

a hash is primitively one-sided and fully lossful, due to the secure nature of its actual algorithm.


  • 0

Contact for professional programming services.

 

6+ years desktop application development experience.
Python and C, reverse engineering experience on x86{-64} native binaries.
Versed in penetration testing, CompTIA Network+ certified.

Discord: xchg#5401

 

Your one-stop-shop for homework help: PaperPeers.com



 Users browsing this thread: