- This topic has 25 replies, 8 voices, and was last updated 17 years ago by Ponies.
-
AuthorPosts
-
August 31, 2006 at 2:10 am #185245AdminAdministrator
I was trying to decifer the PT passwords saved in the registry. And iv’e made some progress. I notice that the encrypted passwords of the same password were different and i noticed that there is a time element in the encryption of these passwords. So I made ten niks EXACTLY one minute (to the very secont) apart. All the passwords to all ten niks are 00000 (5 zeros).
For every character in a password the encryption has 4 digits. So a password of 00000 in the encrypted form would be 23502195220122282435.
So now here are the 10 encrypted passwords to the 10 niks. (all are 00000) And ill separate the digits so it can be read easier:
2350 2195 2201 2228 2435
2350 2195 2201 2238 2435
2350 2195 2201 2248 2435
2350 2195 2201 2258 2435
2350 2195 2201 2268 2435
2350 2195 2201 2278 2435
2350 2195 2201 2288 2435
2350 2195 2201 2298 2435
2350 2195 2201 2308 2435
2350 2205 2201 2218 2435These were all made exactly 1 min (60 secs) apart from each other, and are posted in the order they were made.
What do you notice? They are all the same except for the 4th character! And the 4th goes up in incriments of 10 for each minute. 2228, 2238, 2248, etc. The only thing i cant figure out is that the last one is 2218. If they all were going up by ten then it should be 2310….right? but its not.
Here are all the niks and all their info so u could mess with it and try to figure it out. I include the date and time according to my PC’s clock.
(ALL PASSWORDS ARE 00000)
Nik: 01PTENC
UID: 44552855
ENC: 23502195220122282435
Date: 8/30/2006 8:43:00 PMNik: 02PTENC
UID: 44552862
ENC: 23502195220122382435
Date: 8/30/2006 8:44:00 PMNik: 03PTENC
UID: 44552871
ENC: 23502195220122482435
Date: 8/30/2006 8:45:00 PMNik: 04PTENC
UID: 44552882
ENC: 23502195220122582435
Date: 8/30/2006 8:46:00 PMNik: 05PTENC
UID: 44552890
ENC: 23502195220122682435
Date: 8/30/2006 8:47:00 PMNik: 06PTENC
UID: 44552906
ENC: 23502195220122782435
Date: 8/30/2006 8:48:00 PMNik: 07PTENC
UID: 44552921
ENC: 23502195220122882435
Date: 8/30/2006 8:49:00 PMNik: 08PTENC
UID: 44552932
ENC: 23502195220122982435
Date: 8/30/2006 8:50:00 PMNik: 09PTENC
UID: 44552938
ENC: 23502195220123082435
Date: 8/30/2006 8:51:00 PMNik: 10PTENC
UID: 44552950
ENC: 23502205220122182435
Date: 8/30/2006 8:52:00 PMI hope this helps a little so we can eventually be able to decrypt all PT passwords from the registry. 😀
August 31, 2006 at 2:39 am #185270PoniesMemberInteresting.
August 31, 2006 at 2:54 am #185269AdminAdministratorWould be interesting if you could make a nik every second and see how the encryption changes for each second. Maybe a prog for that could be made, since its humanly impossible to fill out the for in less than a sec…lol…But maybe we dont need to make one for each second if we could find more patterns. Gotta keep messin wit it. 😀
August 31, 2006 at 3:24 am #185268AdminAdministratorok, so you stated that all nicks were entered exactly 60 seconds apart from each other…in that case, how do you know that the fourth number increases ever 60 seconds? it could be that it increases every time a new nick is entered into the registry…if so, that would make it that much harder to crack seeing as how you dont know how many nick are in the registry or if there was a nick that has been deleted from the registry…
August 31, 2006 at 3:35 am #185267PoniesMemberall 11111
10bbbvbfvv – 28902211228922212318
10bbbvbfvv_1 – 22082218228022262311
10bbbvbfvv_2 – 22152216228122222314
made every 40 sec’s
look’s random to me xD
August 31, 2006 at 5:20 pm #185266DarkCoderMemberbut it can’t be random cause then paltalk client wouldn’t be able to decrypt it
September 1, 2006 at 1:20 am #185265MrAl3nMemberHmm well we suld look into it and get more info and maybe make a program wot u think justin ?
September 1, 2006 at 3:56 am #185264DarkCoderMemberblah there is no point.. as soon as we decrypt it.. the next day after paltalk finds out we know how to do it.. the algorithim is going to be changed.. and all that work goes down the drain.
September 1, 2006 at 4:26 am #185263PoniesMemberWhat if it include’s Something from the name xD
September 1, 2006 at 6:04 am #185262AdminAdministratorOr, what if it changes with every computer ❓ or even every download ❓ it could be like the same type thing that syxx, made that thing where it would ‘dycriypt’ a scrambled message with a certain password…
September 2, 2006 at 2:01 am #185261MrAl3nMemberLets give it a shot and try
September 2, 2006 at 5:25 am #185260PoniesMemberWelllllllllll… Go on then alen.
Give it a shot and try.
-Wait’s-
September 2, 2006 at 6:42 pm #185259AdminAdministratorI think it could be done if we all put our brains together in this…..check out how v3.1 encrypts PWs….they are still stored in the same registry but if u use the password decryptor program to see behind the ***** a password of 00000 comes out to Û~tÛm9Ûm5Ûm|ÛÂÂù and is the same alway…never changing….its 3 characters to every character instead of 4….. 😀
September 3, 2006 at 2:13 pm #185258LoCNiNjAMemberhey guys do alittle test to see what you find and if there is any significanse to this
1. find the Ascii value for each letterin your password add them togeter and keep that to one side
2.take the encypted password and / by the uID decimal from the registry
take allthe numbers befor the desimalplace and / by the uID again and look at the begining numbers and the first numbers you added together i did this and they were the sam what i am saying is do you think that the encryption is using the user ID to encrypt the password hu i dont know what but it could beSeptember 3, 2006 at 3:23 pm #185257AdminAdministratork…let us know when your done with that…
@LoCNiNjA wrote:
hey guys do alittle test to see what you find and if there is any significanse to this
1. find the Ascii value for each letterin your password add them togeter and keep that to one side
2.take the encypted password and / by the uID decimal from the registry
take allthe numbers befor the desimalplace and / by the uID again and look at the begining numbers and the first numbers you added together i did this and they were the sam what i am saying is do you think that the encryption is using the user ID to encrypt the password hu i dont know what but it could be -
AuthorPosts
Related
- You must be logged in to reply to this topic.