[21423] in bugtraq
Re: Messenger/Hotmail passwords at risk
daemon@ATHENA.MIT.EDU (Peter van Dijk)
Mon Jul 9 21:06:23 2001
Date: Mon, 9 Jul 2001 21:24:29 +0200
From: Peter van Dijk <peter@dataloss.nl>
To: BUGTRAQ@securityfocus.com
Message-ID: <20010709212429.A67387@dataloss.nl>
Mail-Followup-To: BUGTRAQ@SECURITYFOCUS.COM
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <F7416xsoIIzQtO9vXLs000040f6@hotmail.com>; from c3rb3r@hotmail.com on Fri, Jul 06, 2001 at 09:32:36PM -0000
On Fri, Jul 06, 2001 at 09:32:36PM -0000, gregory duchemin wrote:
[snip]
> the hash creation process is as follow:
> ======================================
>
> say user toto has a password "titan"
> then his client generate the string "yyyyyyyyy.yyyyyyyyytitan" and the
> according MD5 hash, say xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.
> the client send MD5(yyyyyyyyy.yyyyyyyyytitan) on the wire.
This is the exact same thing APOP does - server sends a string, client
appends password to string, takes MD5 hash and sends back. If your
cracker is what you say it is (I haven't checked) then APOP should be
just as vulnerable.
Greetz, Peter
--
Against Free Sex! http://www.dataloss.nl/Megahard_en.html