On Mon, 8 Sep 2003, Ron Johnson wrote:
> On Mon, 2003-09-08 at 11:32, Doug McNaught wrote:
> > "scott.marlowe" <[EMAIL PROTECTED]> writes:
> >
> > > On Mon, 8 Sep 2003, Bruno Wolff III wrote:
> > >
> > > > It is probably worth trying to spend some time trying to find a finite
> > > > set of pass
On Mon, 2003-09-08 at 11:32, Doug McNaught wrote:
> "scott.marlowe" <[EMAIL PROTECTED]> writes:
>
> > On Mon, 8 Sep 2003, Bruno Wolff III wrote:
> >
> > > It is probably worth trying to spend some time trying to find a finite
> > > set of passwords that are guarenteed to be generators for all pos
"scott.marlowe" <[EMAIL PROTECTED]> writes:
> On Mon, 8 Sep 2003, Bruno Wolff III wrote:
>
> > It is probably worth trying to spend some time trying to find a finite
> > set of passwords that are guarenteed to be generators for all possible
> > MD5 hashes (or at least those than can possibly occu
On Mon, 8 Sep 2003, Bruno Wolff III wrote:
> On Mon, Sep 08, 2003 at 08:53:26 -0600,
> "scott.marlowe" <[EMAIL PROTECTED]> wrote:
> > 3: Compare your infinite number of md5 sigs to the one stored for the
> > user. When they match, you've got the original password, or at least a
> > password
On Mon, Sep 08, 2003 at 08:53:26 -0600,
"scott.marlowe" <[EMAIL PROTECTED]> wrote:
> 3: Compare your infinite number of md5 sigs to the one stored for the
> user. When they match, you've got the original password, or at least a
> password that will work just like the original.
It is probably
On Sat, 6 Sep 2003, Don V. Soledad wrote:
> good day!
>
> is there a way to retrieve a user's decrypted password, just like when i
> issued a "SELECT * FROM pg_shadow;" in the earlier version of postgresql?
Sure, here's the simple method:
1: Generate a list of all possible passwords.
2: Gene