Sly_Ripper

+Clients
  • Content count

    131
  • Joined

  • Last visited


About Sly_Ripper

  • Rank
    IPB Full Member
  • Birthday 01/05/1991

Sly_Ripper's Activity

  1. Sly_Ripper added a comment on a blog entry IPS 4.0: Editor - Part 1: Content   

    I really hope this doesn't end up looking like a Windows 8 app...
  2. Sly_Ripper added a post in a topic All IPB forums breaching EU law   

    It's a stupid law. If everyone just ignores it, it will go away. It cannot be enforced.
  3. Sly_Ripper added a topic in Product Feedback   

    [Delete All] Button for Notifications
    I took a look at my "View all notifications" page on my forum and there's a few months worth there, we need a button to just quickly delete them all.
    • 2 replies
    • 604 views
  4. Sly_Ripper added a topic in Company Feedback   

    The breadcrumb arrow character
    I was just looking at a breadcrumb and thought they would look better with this character for the arrow (and changed to 13px): ›

    Example:


    Yes/no?
    • 2 replies
    • 930 views
  5. Sly_Ripper added a comment on a blog entry IP.Chat 1.4 Development Update   

    Updates look good, especially the mobile skin support.
  6. Sly_Ripper added a post in a topic Strong password: between 3 and 32 characters   



    And what if someone got their hand on a dump of the DB? We're back to 1 second.
  7. Sly_Ripper added a post in a topic Strong password: between 3 and 32 characters   



    Not at all, I hashed a 4 character password: h_E@
    Hash: b77ef9eb5ced73987987fb8846775f24
    I then bruteforced it with my GPU using these characters:
    !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~⌂

    Starting from [ ] (4 spaces)
    Hash type: MD5, Hash: b77ef9eb5ced73987987fb8846775f24
    Device #0: [GeForce 9600 GT] 1500.00 Mhz 48 SP
    Found password: [h_E@], HEX: 68 5f 45 40
    Processed 92 274 688 passwords in 1s.
    Thus, 173 775 306 password(s) per second in average.

    I know IPB uses salts but if you have access to the hash then you'll almost always know the salt too.