Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
UGL OZ
UGFREAK
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsUGL OZUGFREAK

hotmail password program

  • Thread starter Thread starter prophet
  • Start date Start date
prophet said:


ok i got another idea...the last time i spoke to her was on sept 26th (the day it all happened, and if you don't know what that means read my previous posts) the court ordered a temporary (60 day restraining order) on october 7th,,,now christmas is coming up and i think i am legal to go to her house with a gift. so this was my plan. i am going to buy her a tiffancy & co necklace and bring it to her place a few days before christmas. i'l put on my santa hat and ring her bell. i don't know what her reaction will be. if that fucking gay ass boyfriend is there i should go ahead and punch that fucker i the head again. if shes alone then maybe i should try and talk to her. tell her how much i miss her and how much she still means to me...all the bullshit. any input here. this might be a better solution than killing her or the bombing recourse as happyscrappy put it. if christmas doesn't work there is always valentines day. there is one thing i am worried about she is 28 and looking to get married. i am 6 years younger than her or else i would have considered it when she talked about it. what if she has a ring on her finger??!?!!?!? what do i do then? I HAVE TO GET HER BACK BEFORE SHE MARRIES SOME FOOL

Seriously man, you need to take a step back and just read what you wrote.

She has a restraining order against you. She is scared of you. Anything you do at this point is not going to make her forget all of that and come running back into her arms.

Move on.
 
Code said:


Ahh, a collision in MD5 happens once in 200 million. Meaning if you hashed the same two words it would take roughly 200 million times to get the same cypher text.

Thats one reason why Ron Rivest invented it, to replace MD3 which had a collion once every 1 milion or so hashes.

Brute forcing a hash isn't all that feasible from the end-user perspective. Now if that end-user happened to have a beowulf cluster or possibly a couple E10k's clustered, he'd stand a chance at getting a collision in his lifetime.


Remember, encryption isn't about making data safe, its about buying the data a block of time during which it is safe.

Meaning using DES gives the data roughly 4-8 hours of safety. 3DES gets you roughly a week, rijndael buys you about a year, same with blowfish blah blah blah blah.

Since MD5 cannot be used as encryption, since there literally is no way to "unhash" it. I mean there are ways to use non-linear attacks or even sophisticated linear attacks...but there is no mathematical way to unhash them.

I'm no expert in this field but I remember one of the computer guru at the HQ in Ottawa was able to open a Yahoo account a year ago. It took him about 2 hours. Dunno if he used a keylogger, brute forcing or whatever, but that day I looked stupid.

Also back when Triedia has a "hidden source forum" I had a conversation at the cafeteria with an expert working with us. He was telling me how they could break into those forums (they were doing that mostly on kiddie porn servers) using different techniques. So I guess everything is possible assuming you have the right tools.....
 
when you break into a forum or online mail program, 9 times out of 10, it is via a poorly programmed interface. a hole.

the other times it is just guessing passwords.
 
Wait a second, if she has MSN then things could be possible no ? I heard hacking MSN was pretty much easier and since you need to enter the same password as your e-mail account then....
 
manny78 said:
Wait a second, if she has MSN then things could be possible no ? I heard hacking MSN was pretty much easier and since you need to enter the same password as your e-mail account then....

No. MSN uses MS Passport as an authentication method. It's architecture is shitty but it does provide a massively more secure authentication method than MSN used to.

The only possible method (outside of social engineering [that includes stupid apps asking you to re-type your password]) would be to hack the authentication server(s).

Since MSN uses a geographic bank of authentication clusters, breaking the users down based on two factors; their registered address and their most commonly used gateway. For instance, if I signed up for MSN and my billing address was in California but I logged in most frequently from the Houston area backbone I would likely have my profile stored in the California server but cached on the Texas server.

So, in this case, I would have to hack one or the other. Although the cached profile may or may not store a password, it might just have a pointer to my password in California.

Once I've hacked into the CA-AUTH server, I would then go about tracking the user's profile down. Chances are I only have about an hour before someone notices me poking around, so I'd hop to the lowest level and do SQL calls to pull out the hashed or possibly encrypted password. Dump the cypher-text to a my client and log off.

Then I'm stuck with cypher-text, that if encrypted was done so using a symetric key....much tougher than an asymetric key. It was probably done so with 3DES or RSA's putrid spin-off.

That means that with my little mac, it would take me a minimum of 48 weeks to crack. Assuming I devote 100% of my processor to the task. A pc would take roughly the same time, although since PC's have a much harder time factoring large primes I'd add about 20% to the total time.

By then your ex-girlfriend would be married, possibly well into pregnancy. You can certainly bet that she's forgotton about you entirely, which is more than I can say for those of us on EF.
 
Prophet, my man, you are truly an idiot.

These posts are making fun of you, not supporting you.
She dosen't want you and I'm not surprised.
Stop stalking her before you end up in jail, tard.
 
Bullit said:
Prophet, my man, you are truly an idiot.

These posts are making fun of you, not supporting you.
She dosen't want you and I'm not surprised.
Stop stalking her before you end up in jail, tard.

the funny thing is this....she was so in love with me before all the bullshit happened. it really all started when we were out and she asked me to go to el paso with her to meet her family i told her i was too busy and she got all dramatic and pissed off. i was coming back from the city with her and i threw her out of my car. (i think it was on hamiton ave in brooklyn not the greatest place) so she said some crap story about how some guy harrassed her and how if i loved her i would have never kicked her out of the car. i didn't respond to her calls and i got and email saying it was over from her. after that i gave it a month and when i went to see her she had a new boyfriend. i did love her and i still do i just don't get why it all had to happen like this
 
ok this is my last post about this....
i know this:
her ip address
where she registered for MSN/hotmail
her email address


i might know:
the server she connects to
(i did a trace route and it went to a)
server in NYC
and sometimes it goes to one in DC

what can we do with that info
 
prophet said:
ok this is my last post about this....
i know this:
her ip address
where she registered for MSN/hotmail
her email address


i might know:
the server she connects to
(i did a trace route and it went to a)
server in NYC
and sometimes it goes to one in DC

what can we do with that info

Well, simply by soliciting assistance you are commiting a felony, since it's a felony to Conspire to Commit a Felony. You're conspiring to commit wire fraud and electronic theft.

You're also conspiring to break the restraining order.

But to answer your question....
RE: traceroute. What did you trace, her IP address?
If she uses MSN the IP address you have is useless, unless she has a reason to purchase a static IP.

Here is what you'd need to give someone if you wanted her password.

MSN username.
Past passwords you've allegedly guessed.
Her address.
Her mother's maiden name.
Oh, and money.

Giving someone a dynamic IP is about as useful as handing out blank business cards.
 
Top Bottom