badbadtz560
Limp Gawd
- Joined
- Apr 20, 2004
- Messages
- 440
Let me know if this is deemed inappropriate. I'm asking this for my classwork.. and I don't think these programs can be used to hack w/o physical access anyway.
I'm doing a final presentation for my network security class and like the idea of password security (and why you just shouldn't store passwords anywhere except your own noggin ). However, one big thing that I'm looking at is password recovery tools. I've got several working ones, but is there any way I can get some example code of how these programs decrypt the files?
I need a part where I can say something to this effect: as you can see from this code, this line shows program-x applying y to decrypt the password from the z-account by using the password storage file found in the installation folder.
It'd be my guess that these programs simply search out specific files in their default folders and decrypt the passwords out of these files... but I just can't find any code that proves it. Can anyone help me out? (preferably w/ a password recovery that would work .. and code that goes with it?)
I'm doing a final presentation for my network security class and like the idea of password security (and why you just shouldn't store passwords anywhere except your own noggin ). However, one big thing that I'm looking at is password recovery tools. I've got several working ones, but is there any way I can get some example code of how these programs decrypt the files?
I need a part where I can say something to this effect: as you can see from this code, this line shows program-x applying y to decrypt the password from the z-account by using the password storage file found in the installation folder.
It'd be my guess that these programs simply search out specific files in their default folders and decrypt the passwords out of these files... but I just can't find any code that proves it. Can anyone help me out? (preferably w/ a password recovery that would work .. and code that goes with it?)