ITT WE CRACK PEOPLES' TRIPCODES AND POST THEM. LIKE THIS:
Mr VacBob#avisucks
moot#faggot
Lain#hydrocat
SovietRussia#deadjew
Alexander##fuck
t
Herro yankees
age#2111
Weren't most of these available freely anyway?
>>9
eat poop! ( ・∀・)つ●)`Д´(●ヽ(・∀・ ) yes eat it!
>>9
Yes. I think they're just getting the ball rolling, as'twere.
who put the ball in the trash again?
wahoo
yahoo
zomg
zOMG
#ZOMG
hR6k
Plasma_Ghost#tripcode
Oryan#blargh
Esoteric Shadow#penumbra
BludClot#shrooms
Tripcode Elemental#BMDX
FlamingTrousers#deadcow
Amorous Anonymous#fi1u12
Jimmy Mnemonic#clear
Setsuna#Ninja
They Might Be Anonymous#Doomsday
MadDuke#gotohell
Iron Head Rat#purple
Spasser#mongol
wait, these are actual tripcode breaks?
wait, these are actual tripcode breaks? Oh, you faggots, now I have to switch trip1.
and you dumb faggots still don't have snacks.
do you have a compile of tripcode breaker, too lazy to download free compiler.
w00t, my trip hasn't been cracked yet, but I can't run tripper+ properly.
Inst!fVqSXvQXlg!!GAcrbV+3
↓
I am so lonely and nobody cares...
=@ ___
.∧_∧ ||\ \
( ´・ω・.)..|| |.二 二|
( .つつ||/ /
|二二二二二二二二二二|
|| ̄ ̄ ̄ ̄|| ̄ ̄ ̄ ̄||
 ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄
∧_∧ riiiiing
( ´・ω・)コ
( oロ.ノ ヱ
`u―u'~~~〔◎〕
"""""""""""""
_______
Hi, mom How are you | Oh honey, |
 ̄∨ ̄ | what is wrong? |
∧_∧ ∠ |
( ´・ω・)コ  ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄
( oロ.ノ ヱ
`u―u'~~~〔◎〕
"""""""""""""
I HATE YOU I WISH I HAD NEVER BEEN BORN!
 ̄∨ ̄
∧_∧
( ゚ Д ゚)コ
( oロ.ノ ヱ
`u―u'~~~〔◎〕
"""""""""""""
∧_∧ click
( ´・ω・)
/ つつロヱロ
し―-J' .〔◎〕
"""""""""""""
on the mark, my good man.
Still haven't nuked my coretripcode yet.
okay, just crashed retard winxp netcafe machine trying to crack own tripcode.
5ibG0jiWNc
5ibG5ibG5ibG
lets see...
~370 trillion bytes of tripcode
10 digit trip...
~37 trillion tripcodes
125,000 / sec / ghz
google says 296,000,000 secs/ghz
4,933,333.33/min/ghz
82,222/hr/ghz
3,425/days/ghz
but there's a flaw in the encryption scheme right?
The flaw is that people use lowercase dictionary words for their trips.
Osaka#somethin
orly?
Related thread:
Relevant:
http://4dist.yi.org/_darcs/current/
http://www.blackmage.org/bm/wakaba/sandbox/res/293.html#i293
special wtfux tripcode edition:
"/viWp5eJ7M" == am "ramakand" for Tradition
"1cw3yHQWPU" == os "loser" for hitsugi-chan
"40wTp2SuQA" == 38 "4386" for Casey Benedict
"40wTp2SuQA" == 38 "4386" for Whitefire_Phoenix
"7YNjkQXRoY" == ol "holms" for shlom
"90DqOMAzzQ" == ea "peachesa" for pizza
"ApW7h3/alM" == FK "NFK" for Hiryu
"BFMQOBVsq2" == HA "WHAM" for flaminspatula
"Cv4F.Ton2s" == 0m "z0mG" for t00t
"FEZKlA6o6g" == la "blarg" for ?Man_of_Mystery ?
"IFQSknf/N." == in "ninja" for z0s
"IHz1xNo7cY" == yu "nyuu" for Zweihander
"MtPxH6aT8A" == sx "asx145" for leo
"NFQrQpaohQ" == ea "Yeah!" for HoodyVader
"SDh0.MH382" == an "cantstop" for HandsomeMatt
"VAPEnPev9o" == lu "fluffi" for Meggy
"YTVxxKH.bU" == ss "asshole" for haruko
"ZxA9b/rk0g" == ea "deathscy" for Silas
"a6/9fF6Eqg" == ig "nigga" for Sol-Badguy
"gBeeWo4hQg" == H. "^" for hmuryj
"hEpdoZ.tHU" == ri "trip" for iPodNano
"j1Ylk0gFC2" == il "pilcrow" for ?lieu
"k/ML0Ouw/A" == na "anacardi" for Lacquer
"kxrJVlZ8OE" == ah "hahaha" for washer
"nqprlgUDj6" == uh "buh" for ?Normal-chan
"o7IoaYt5UM" == he "cheese" for Thirdfold
"ozOtJW9BFA" == as "password" for Kamui_Moteuchi
"ozOtJW9BFA" == as "password" for Worm
"tsGpSwX8mo" == H. "1" for Not
"upWm/KiLZA" == an "panis" for ?Eric
"upWm/KiLZA" == an "panis" for Eric
"wmSvemWhS2" == ar "harrison" for Whitey
"xBtXOIdfsk" == ia "miaow" for strifeheart
"xJvxIGZ1bg" == as "casbah" for Genin
semi-relevant: http://4-ch.net/dqn/kareha.pl/1112369187
this thread delivers
testing
testing
õ
dontwork#BFMQOBVsq2
hmm?
BANKAI!
BAN
DAI
makes shitty overpriced merch
and wants to die
BECAUSE ITS WINTER
turned the gun on itself
I have cracked MODD it is MODD!withtripcode
>>61 is assigned banned status.
So those crazy "custom" tripcodes are the hardest to crack
because they follow the rules of a good password.
Unless the user is DQN enough to do a sequential search
and take the first match that pops up.
Even people with custom tripcodes barely scratch the surface of the possibilities. 56 bit key(8 characters of 7 bits, 8th bit discarded) -> cannot use # character (you only lose a tiny bit here) -> further reduced to something like [0-9a-zA-Z!@$%^&*()-=+;'/.?><:"`~]
Then again, the keyspace really doesn't matter, as the tripcode's pretty tiny too. Honestly, i'm surprised there are not any known collisions.
>>42
Yes, DES has been "broken". The problem is you need a lot of known or chosen plaintexts for the key, and a tripcode always uses the same plaintext (all 0x00) thus that isn't going to help.
2^56 72057594037927936
128^8 72057594037927936
2^7 ^8
98^8 8507630225817856
94^8 6095689385410816 (typable)
2^53 9007199254740992
64^10 1152921504606846976
2^60 1152921504606846976
Now we start killing the keyspace
First things first, no # or we would hit secure tripcodes
127 possible characters
clean_string will kill 0x00-0x08, 0x0b-0x0c, 0x0e-0x1f 29 characters total
Thats a lot of characters you say, yeah, total down to 98 (98^8 8507630225817856) basically an order of magnitude
And since the salt is chosen from the key, no help there
Now, crypt(3) returns a 13 character string, only the last 10 characters are saved. The first two were the salt anyways
So now we have 10 characters that have 64 possible combinations ( 0x2e-0x39 [./0-9] (12 characters), 0x41-0x5a [A-Z] (26 characters), 0x61-0x7a [a-z] (26 characters)
64^10 1152921504606846976
Thus, we should be able to find a collision in 2^30
My low-end a64 can do ~900,000 des operations a second, but 2^20 (1,048,576) is certainly a reasonable number.
So finding a collision would take 2^30/2^20 time, or 2^10 1024 seconds... yay?
It would take 2^60/2^20 = 2^40 seconds on average for a first-preimage attack, or 34,842.1652 years.
(And theorhetically, found any novelty tripcode you wanted)
Lets try to exhaust the keyspace, remember that 98^8 number? It is ~ 2^53 (9007199254740992)
2^53/2^20 = 2^32 = 4294967296 seconds or 136.102208 years.. still seems like a long time. Get 150 computers (or friends with them) and you end up with 331 days.. 1500 computers and just over a month..hey if you have $750,000 burning a hole in your pocket you could do it in under a month (assuming ~$400 for a computer that does 2^20 a second)
Does this sound familar to anyone though? In '98 the EFF made Deep Crack for $250,000 and it could do over 9,000,000,000 DES operations a second. 2^56 took ~ 5 days, 2^53 would take a lot less.. and that isn't even taking into account Moore's law (Assuming 8 years, thus 96 months, 96/18 5.333... 'doubling' of computing power) it would only cost ~$7500 for 5 days or take only 3.5 hours for $250,000
I certify this post as VIP quality
>>64 Lets collide.
dfg
lol internet
test
Hold this test
I've got a trip code, I'm a piece of toast, LOOK AT ME!
whats going on in this thread?
my trip
hax plz
HAVE A POO
I cant fucking crack Snacks.
uguu
It gets worse, actually. DES is insanely resistant to key recovery, and the known-plaintext and chosen-plaintext attacks are essentially worthless. Even implementing the chosen-plaintext attack for tripcodes would reduce the complexity to 2^49, at most. That keyspace is far too large to search.
The good news is that the reduced hash nature of crypt() means that collisions actually can happen, if you search long enough. Essentially, your best bet is to use the fasttrip approach: use rand() to pseudorandomly iterate through possibilities of 8-character keys, and use a regex to search for the tripcodes you want.
Regex? If you're trying to crack a tripcode a regex is a waste of cycles; you'd want strcmp() instead.
Can't crack mine... cuz I'm God.
test
sup, guys?