Jump to content

Recommended Posts

Posted

Hey guys, I've been working lately on a project developed directly from my GitHub repository. I'm optimizing it as much as possible, minimizing false positives. Feel free to try it out with complete confidence 🤖

myLogin 🛡️

Posted
Func _getHash($sInput)
   $sHash = _Crypt_HashData($sInput, $CALG_SHA_512)
   $sInput = "" ; clear
   Return _Crypt_HashData($sHash, $CALG_MD5) ; 128-bit
EndFunc

Good 1st post, cool :)

So..., why hash the hash, with a grater possibility of collision hash ? The 512 is good as is. What's the idea behind it ? 

Follow the link to my code contribution ( and other things too ).
FAQ - Please Read Before Posting.
autoit_scripter_blue_userbar.png

Posted

Thanks, yes, good observation, I'm aware of that, the purpose of why md5 is to make it shorter in case a parameter is used it tends to be very long if it wasn't.

myLogin 🛡️

Posted

...then use crc32, is even shorter :P

I'd go with the 512. No one would ( haven't run the code, just looked at it in the browser ) brute force the login screen, quite unlikely.
There is no reason to have to type a hash. You enter the password and if that's not it, ..that is not it.

Anyway, if you press ctrl+alt+delete you can override the password, right ?

Follow the link to my code contribution ( and other things too ).
FAQ - Please Read Before Posting.
autoit_scripter_blue_userbar.png

Posted

Ok, I'll keep that in mind, as for the key combination, I implemented a method that temporarily suspends the explorer without killing it, preventing you from opening the start menu, running commands from the task manager.

myLogin 🛡️

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...