Page 1 of 2 12 LastLast
Results 1 to 25 of 34

Thread: We shoulda done this ages ago!

  1. #1
    Join Date
    Dec 2011
    Location
    Toronto, Ontario
    Posts
    6,424
    Mentioned
    84 Post(s)
    Quoted
    863 Post(s)

    Default We shoulda done this ages ago!




  2. #2
    Join Date
    Mar 2012
    Location
    Canada
    Posts
    870
    Mentioned
    1 Post(s)
    Quoted
    5 Post(s)

    Default

    Marcus225@gmail.com
    dolfin756
    2132

    Rate?
    My scripts:
    Advanced Barb Agility Course(outdated), MonkeyThieverV0.11, MahoganyTableV0.4(outdated)
    Questions? I bet that for 98% of those, you'll find answer HERE

  3. #3
    Join Date
    Jan 2012
    Posts
    915
    Mentioned
    13 Post(s)
    Quoted
    87 Post(s)

  4. #4
    Join Date
    Feb 2007
    Location
    Colorado, USA
    Posts
    3,716
    Mentioned
    51 Post(s)
    Quoted
    624 Post(s)

    Default

    legit as hell, but they don't allow you to type your pass :P

    one of my passes (not saying which one) is i9t69uf4823^#%$0%$9fhasn1zx

    all the others are similar B) , although not for rs cuz I don't play lol
    The only true authority stems from knowledge, not from position.

    You can contact me via matrix protocol: @grats:grats.win or you can email me at the same domain, any user/email address.

  5. #5
    Join Date
    Jan 2012
    Posts
    915
    Mentioned
    13 Post(s)
    Quoted
    87 Post(s)

  6. #6
    Join Date
    Feb 2007
    Location
    Colorado, USA
    Posts
    3,716
    Mentioned
    51 Post(s)
    Quoted
    624 Post(s)

    Default

    ^ not runescape, give your reading skillz 0
    The only true authority stems from knowledge, not from position.

    You can contact me via matrix protocol: @grats:grats.win or you can email me at the same domain, any user/email address.

  7. #7
    Join Date
    Oct 2009
    Location
    Stockton, CA
    Posts
    2,040
    Mentioned
    0 Post(s)
    Quoted
    1 Post(s)

    Default

    Quote Originally Posted by grats View Post
    legit as hell, but they don't allow you to type your pass :P

    one of my passes (not saying which one) is i9t69uf4823^#%$0%$9fhasn1zx

    all the others are similar B) , although not for rs cuz I don't play lol

    Better to use a phrase than random characters man.
    Join the IRC! irc.rizon.net:6667/srl | SQLite (0.99rc3+) | SRL Doc | Simba Doc | Extra Simba Libraries (openSSL & sqlite3)
    Quote Originally Posted by #srl
    10:45 < Toter> daphil when can get sex anyday I want
    10:45 < Toter> he is always on #SRL
    "A programmer is just a tool which converts caffeine into code"

  8. #8
    Join Date
    Feb 2007
    Location
    Colorado, USA
    Posts
    3,716
    Mentioned
    51 Post(s)
    Quoted
    624 Post(s)

    Default

    Quote Originally Posted by Sex View Post

    Better to use a phrase than random characters man.
    No.
    The only true authority stems from knowledge, not from position.

    You can contact me via matrix protocol: @grats:grats.win or you can email me at the same domain, any user/email address.

  9. #9
    Join Date
    Oct 2009
    Location
    Stockton, CA
    Posts
    2,040
    Mentioned
    0 Post(s)
    Quoted
    1 Post(s)

    Default

    Quote Originally Posted by grats View Post
    No.
    Why no?
    Join the IRC! irc.rizon.net:6667/srl | SQLite (0.99rc3+) | SRL Doc | Simba Doc | Extra Simba Libraries (openSSL & sqlite3)
    Quote Originally Posted by #srl
    10:45 < Toter> daphil when can get sex anyday I want
    10:45 < Toter> he is always on #SRL
    "A programmer is just a tool which converts caffeine into code"

  10. #10
    Join Date
    Feb 2007
    Location
    Colorado, USA
    Posts
    3,716
    Mentioned
    51 Post(s)
    Quoted
    624 Post(s)

    Default

    Quote Originally Posted by Sex View Post
    Why no?
    You're basing cracking off password character size

    to guess an all text a-z A-Z it is like 4GB file, no problem at all..

    my passwords are usually 200 characters, special characters, words, numbers, letters, caps, etc those take 100+GB files to crack along with a long ass time

    and it's easy as shit for me to remember, I'm not some 90 year old who can barely remember 5 letter password

    for example, some of my database user passwords are like:

    76876%T&^%TR*&tG*67sar76d9fads6tR#$&%!T89Y(*FHG(US DT8ydtgas9-du7g-&(*t0ATGYSG)8d6ars6drdfw21g


    Also, just to add, the main security threat is someone guessing a password, not someone brute forcing it.. brute forcing is pretty much dead. There's almost nothing that doesn't lock accounts out, lock IP's out, disable accounts.. after so many guesses etc.
    Last edited by grats; 08-25-2012 at 05:29 AM.
    The only true authority stems from knowledge, not from position.

    You can contact me via matrix protocol: @grats:grats.win or you can email me at the same domain, any user/email address.

  11. #11
    Join Date
    Oct 2009
    Location
    Stockton, CA
    Posts
    2,040
    Mentioned
    0 Post(s)
    Quoted
    1 Post(s)

    Default

    Quote Originally Posted by grats View Post
    You're basing cracking off password character size

    to guess an all text a-z A-Z it is like 4GB file, no problem at all..

    my passwords are usually 200 characters, special characters, words, numbers, letters, caps, etc those take 100+GB files to crack along with a long ass time

    and it's easy as shit for me to remember, I'm not some 90 year old who can barely remember 5 letter password

    for example, some of my database user passwords are like:

    76876%T&^%TR*&tG*67sar76d9fads6tR#$&%!T89Y(*FHG(US DT8ydtgas9-du7g-&(*t0ATGYSG)8d6ars6drdfw21g


    Also, just to add, the main security threat is someone guessing a password, not someone brute forcing it.. brute forcing is pretty much dead. There's almost nothing that doesn't lock accounts out, lock IP's out, disable accounts.. after so many guesses etc.
    How the fuck is "76876%T&^%TR*&tG*67sar76d9fads6tR#$&%!T89Y(*FHG(U SDT8ydtgas9du7g-&(*t0ATGYSG)8d6ars6drdfw21g" easy to remember?
    Join the IRC! irc.rizon.net:6667/srl | SQLite (0.99rc3+) | SRL Doc | Simba Doc | Extra Simba Libraries (openSSL & sqlite3)
    Quote Originally Posted by #srl
    10:45 < Toter> daphil when can get sex anyday I want
    10:45 < Toter> he is always on #SRL
    "A programmer is just a tool which converts caffeine into code"

  12. #12
    Join Date
    Dec 2011
    Location
    Toronto, Ontario
    Posts
    6,424
    Mentioned
    84 Post(s)
    Quoted
    863 Post(s)

    Default

    Quote Originally Posted by Sex View Post
    How the fuck is "76876%T&^%TR*&tG*67sar76d9fads6tR#$&%!T89Y(*FHG(U SDT8ydtgas9du7g-&(*t0ATGYSG)8d6ars6drdfw21g" easy to remember?
    Copy and paste

  13. #13
    Join Date
    Feb 2007
    Location
    Colorado, USA
    Posts
    3,716
    Mentioned
    51 Post(s)
    Quoted
    624 Post(s)

    Default

    Quote Originally Posted by Sex View Post
    How the fuck is "76876%T&^%TR*&tG*67sar76d9fads6tR#$&%!T89Y(*FHG(U SDT8ydtgas9du7g-&(*t0ATGYSG)8d6ars6drdfw21g" easy to remember?
    Why would I remember a password that programs use?

    find a keyboard style you like, and generate passwords with it

    for example, keyboard opposites
    q1 p0

    those are opposite side of keyboard
    lets make a password with those, while going inward and capitalizing every other letter and shift every number on every 3 skips:

    q1p0W2O9e#i*R4U7t5y6

    extremely easy to remember.
    q1p0W2O9e#i*R4U7t5y6

    not copied and pasted ^ typed in 10 seconds about
    The only true authority stems from knowledge, not from position.

    You can contact me via matrix protocol: @grats:grats.win or you can email me at the same domain, any user/email address.

  14. #14
    Join Date
    Oct 2009
    Location
    Stockton, CA
    Posts
    2,040
    Mentioned
    0 Post(s)
    Quoted
    1 Post(s)

    Default

    Quote Originally Posted by grats View Post
    Why would I remember a password that programs use?

    find a keyboard style you like, and generate passwords with it

    for example, keyboard opposites
    q1 p0

    those are opposite side of keyboard
    lets make a password with those, while going inward and capitalizing every other letter and shift every number on every 3 skips:

    q1p0W2O9e#i*R4U7t5y6

    extremely easy to remember.
    q1p0W2O9e#i*R4U7t5y6

    not copied and pasted ^ typed in 10 seconds about
    Interesting. Meh.
    Join the IRC! irc.rizon.net:6667/srl | SQLite (0.99rc3+) | SRL Doc | Simba Doc | Extra Simba Libraries (openSSL & sqlite3)
    Quote Originally Posted by #srl
    10:45 < Toter> daphil when can get sex anyday I want
    10:45 < Toter> he is always on #SRL
    "A programmer is just a tool which converts caffeine into code"

  15. #15
    Join Date
    Feb 2007
    Location
    Colorado, USA
    Posts
    3,716
    Mentioned
    51 Post(s)
    Quoted
    624 Post(s)

    Default

    I have some 20+ character passwords I can type in a few seconds, they're very random and make no sense looking at them but where your fingers move to is an extremely obvious pattern (once you know the password)

    the example there is crappy & slow to type, however.. just find a fancy method maybe draw a square with each of your hands on the keyboard or something :P
    The only true authority stems from knowledge, not from position.

    You can contact me via matrix protocol: @grats:grats.win or you can email me at the same domain, any user/email address.

  16. #16
    Join Date
    Aug 2007
    Location
    Colorado
    Posts
    7,421
    Mentioned
    268 Post(s)
    Quoted
    1442 Post(s)

    Default

    Quote Originally Posted by grats View Post
    Why would I remember a password that programs use?

    find a keyboard style you like, and generate passwords with it

    for example, keyboard opposites
    q1 p0

    those are opposite side of keyboard
    lets make a password with those, while going inward and capitalizing every other letter and shift every number on every 3 skips:

    q1p0W2O9e#i*R4U7t5y6

    extremely easy to remember.
    q1p0W2O9e#i*R4U7t5y6

    not copied and pasted ^ typed in 10 seconds about
    Haha genius.

    Current projects:
    [ AeroGuardians (GotR minigame), Motherlode Miner, Blast furnace ]

    "I won't fall in your gravity. Open your eyes,
    you're the Earth and I'm the sky..."


  17. #17
    Join Date
    Feb 2007
    Location
    Colorado, USA
    Posts
    3,716
    Mentioned
    51 Post(s)
    Quoted
    624 Post(s)

    Default

    That's how all my passwords are, don't find my secret drawing on the keyboard and hax0r me =[
    The only true authority stems from knowledge, not from position.

    You can contact me via matrix protocol: @grats:grats.win or you can email me at the same domain, any user/email address.

  18. #18
    Join Date
    Jan 2012
    Posts
    2,568
    Mentioned
    35 Post(s)
    Quoted
    356 Post(s)

    Default

    I've 5-9 digit passwords which can be typed in 1 sec (not kidding) and have never ever been hacked. The chance of guessing a password (username aside) within limits of getting locked is so slim that almost no one actually got hacked due to password being guessed. (mostly keyloggers etc)

  19. #19
    Join Date
    Feb 2007
    Location
    Colorado, USA
    Posts
    3,716
    Mentioned
    51 Post(s)
    Quoted
    624 Post(s)

    Default

    Quote Originally Posted by riwu View Post
    I've 5-9 digit passwords which can be typed in 1 sec (not kidding) and have never ever been hacked. The chance of guessing a password (username aside) within limits of getting locked is so slim that almost no one actually got hacked due to password being guessed. (mostly keyloggers etc)
    I agree, I always had short passwords till about 3-4 years ago I figured out designing stuff on the keyboard is a good way to make ridiculously overpowered passwords.. that are easy (for me at least) to type & remember

    almost all accounts stolen are a form of keylogging, brute forcing is almost dead, in fact it's laughed at in hacking communities 99% of the time, some stuff is still able to get brute forced but it really isn't that great of a tool vs most
    The only true authority stems from knowledge, not from position.

    You can contact me via matrix protocol: @grats:grats.win or you can email me at the same domain, any user/email address.

  20. #20
    Join Date
    Jul 2010
    Location
    Western US
    Posts
    387
    Mentioned
    0 Post(s)
    Quoted
    4 Post(s)

    Default

    A password I use to use, props if you know why I used it. Guess I am turning into an old gezer

    @red@BuyingRuneSets200k!
    Of all the things I have lost, I miss my mind the most.
    Current Projects:
    Addy bar miner and superheater

  21. #21
    Join Date
    Feb 2007
    Location
    Colorado, USA
    Posts
    3,716
    Mentioned
    51 Post(s)
    Quoted
    624 Post(s)

    Default

    lol, I'm old enough to remember that spam if that's what you mean xD
    The only true authority stems from knowledge, not from position.

    You can contact me via matrix protocol: @grats:grats.win or you can email me at the same domain, any user/email address.

  22. #22
    Join Date
    Feb 2011
    Location
    The Future.
    Posts
    5,600
    Mentioned
    396 Post(s)
    Quoted
    1598 Post(s)

    Default

    Quote Originally Posted by grats View Post
    brute forcing is almost dead, in fact it's laughed at in hacking communities 99% of the time, some stuff is still able to get brute forced but it really isn't that great of a tool vs most
    I beg to differ.. Brute forcing is never dead and never will die. No one I know laughs at it. Infact, it's still used to hack WEP and quite a bit of things.

    That's like saying Lookup tables are dead. It's still a sorta brute force and it's used to reverse hashes and stuff. I personally still use John The Ripper and PattyCow for certain things.

    If there is no sufficient exploit or algorithm, brute force/dictionary attacks are most likely the way to go.. So whoever looks down on it has a lot to learn. I think Crackers look down on it.. I doubt a hacker would.


    INB4 Wizzup's Cracker vs. Hacker thingy


    EDIT: I refuse to make a new post..

    @Grats:
    You hack WEP with brute forcing? how terribly inefficient

    Also I have yet to be on a private DNS / private IP / TOR hacking site where brute forcing isn't laughed at
    I'd love to see you packet sniff Mixed-Mode WEP and successfully crack it without BruteForce. In case you don't know, those are the ridiculously expensive linksys routers that switch modes and sometimes broadcasting channels when too many packets are requested.

    Also like I said. Anyone laughing at bruteforce or lookup tables is new to the game.
    Last edited by Brandon; 08-25-2012 at 01:28 PM.
    I am Ggzz..
    Hackintosher

  23. #23
    Join Date
    Aug 2007
    Location
    Colorado
    Posts
    7,421
    Mentioned
    268 Post(s)
    Quoted
    1442 Post(s)

    Default

    Quote Originally Posted by EtherFreak View Post
    A password I use to use, props if you know why I used it. Guess I am turning into an old gezer

    @red@BuyingRuneSets200k!
    That's the old RSC text enhancer format. It was always the first 3 letters of the color, @ran@ was for rainbow, that was the most popular I think. :P

    Oh man, I feel old...

    Current projects:
    [ AeroGuardians (GotR minigame), Motherlode Miner, Blast furnace ]

    "I won't fall in your gravity. Open your eyes,
    you're the Earth and I'm the sky..."


  24. #24
    Join Date
    Feb 2007
    Location
    Colorado, USA
    Posts
    3,716
    Mentioned
    51 Post(s)
    Quoted
    624 Post(s)

    Default

    Quote Originally Posted by Brandon View Post
    I beg to differ.. Brute forcing is never dead and never will die. No one I know laughs at it. Infact, it's still used to hack WEP and quite a bit of things.

    That's like saying Lookup tables are dead. It's still a sorta brute force and it's used to reverse hashes and stuff. I personally still use John The Ripper and PattyCow for certain things.

    If there is no sufficient exploit or algorithm, brute force/dictionary attacks are most likely the way to go.. So whoever looks down on it has a lot to learn. I think Crackers look down on it.. I doubt a hacker would.


    INB4 Wizzup's Cracker vs. Hacker thingy
    You hack WEP with brute forcing? how terribly inefficient

    Also I have yet to be on a private DNS / private IP / TOR hacking site where brute forcing isn't laughed at
    Last edited by grats; 08-25-2012 at 06:49 AM.
    The only true authority stems from knowledge, not from position.

    You can contact me via matrix protocol: @grats:grats.win or you can email me at the same domain, any user/email address.

  25. #25
    Join Date
    Apr 2012
    Posts
    3,356
    Mentioned
    34 Post(s)
    Quoted
    218 Post(s)

    Default

    Quote Originally Posted by Flight View Post
    That's the old RSC text enhancer format. It was always the first 3 letters of the color, @ran@ was for rainbow, that was the most popular I think. :P

    Oh man, I feel old...
    This brought back memories too. I remember trying to find cheats for runescape and colours is what I found

Page 1 of 2 12 LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •