- Sep 8, 2005
- 20
- 0
- 0
Let me know if this is deemed inappropriate. I'm asking this for my classwork.. and I don't think these programs can be used to hack w/o physical access anyway.
I'm doing a final presentation for my network security class and like the idea of password security (and why you just shouldn't store passwords anywhere except your own noggin ). However, one big thing that I'm looking at is password recovery tools. I've got several working ones, but is there any way I can get some example code of how these programs decrypt the files?
I need a part where I can say something to this effect: as you can see from this code, this line shows program-x applying y to decrypt the password from the z-account by using the password storage file found in the installation folder.
It'd be my guess that these programs simply search out specific files in their default folders and decrypt the passwords out of these files... but I just can't find any code that proves it. Can anyone help me out? (preferably w/ a password recovery that would work .. and code that goes with it?)
BTW, i'm familiar w/ john the ripper and such programs that can be used to guess passwords in a brute-type method.. but those take time to use whereas these recovery ones are instant.. I'm thinking they use a set/known decryption algorithm instead of guessing.
I'm doing a final presentation for my network security class and like the idea of password security (and why you just shouldn't store passwords anywhere except your own noggin ). However, one big thing that I'm looking at is password recovery tools. I've got several working ones, but is there any way I can get some example code of how these programs decrypt the files?
I need a part where I can say something to this effect: as you can see from this code, this line shows program-x applying y to decrypt the password from the z-account by using the password storage file found in the installation folder.
It'd be my guess that these programs simply search out specific files in their default folders and decrypt the passwords out of these files... but I just can't find any code that proves it. Can anyone help me out? (preferably w/ a password recovery that would work .. and code that goes with it?)
BTW, i'm familiar w/ john the ripper and such programs that can be used to guess passwords in a brute-type method.. but those take time to use whereas these recovery ones are instant.. I'm thinking they use a set/known decryption algorithm instead of guessing.