Skip to content

PT Registry Decrypting!!!!!!!

Viewing 15 posts - 1 through 15 (of 26 total)
  • Author
    Posts
  • #185245
    Admin
    Administrator

    I was trying to decifer the PT passwords saved in the registry. And iv’e made some progress. I notice that the encrypted passwords of the same password were different and i noticed that there is a time element in the encryption of these passwords. So I made ten niks EXACTLY one minute (to the very secont) apart. All the passwords to all ten niks are 00000 (5 zeros).

    For every character in a password the encryption has 4 digits. So a password of 00000 in the encrypted form would be 23502195220122282435.

    So now here are the 10 encrypted passwords to the 10 niks. (all are 00000) And ill separate the digits so it can be read easier:

    2350 2195 2201 2228 2435
    2350 2195 2201 2238 2435
    2350 2195 2201 2248 2435
    2350 2195 2201 2258 2435
    2350 2195 2201 2268 2435
    2350 2195 2201 2278 2435
    2350 2195 2201 2288 2435
    2350 2195 2201 2298 2435
    2350 2195 2201 2308 2435
    2350 2205 2201 2218 2435

    These were all made exactly 1 min (60 secs) apart from each other, and are posted in the order they were made.

    What do you notice? They are all the same except for the 4th character! And the 4th goes up in incriments of 10 for each minute. 2228, 2238, 2248, etc. The only thing i cant figure out is that the last one is 2218. If they all were going up by ten then it should be 2310….right? but its not.

    Here are all the niks and all their info so u could mess with it and try to figure it out. I include the date and time according to my PC’s clock.

    (ALL PASSWORDS ARE 00000)

    Nik: 01PTENC
    UID: 44552855
    ENC: 23502195220122282435
    Date: 8/30/2006 8:43:00 PM

    Nik: 02PTENC
    UID: 44552862
    ENC: 23502195220122382435
    Date: 8/30/2006 8:44:00 PM

    Nik: 03PTENC
    UID: 44552871
    ENC: 23502195220122482435
    Date: 8/30/2006 8:45:00 PM

    Nik: 04PTENC
    UID: 44552882
    ENC: 23502195220122582435
    Date: 8/30/2006 8:46:00 PM

    Nik: 05PTENC
    UID: 44552890
    ENC: 23502195220122682435
    Date: 8/30/2006 8:47:00 PM

    Nik: 06PTENC
    UID: 44552906
    ENC: 23502195220122782435
    Date: 8/30/2006 8:48:00 PM

    Nik: 07PTENC
    UID: 44552921
    ENC: 23502195220122882435
    Date: 8/30/2006 8:49:00 PM

    Nik: 08PTENC
    UID: 44552932
    ENC: 23502195220122982435
    Date: 8/30/2006 8:50:00 PM

    Nik: 09PTENC
    UID: 44552938
    ENC: 23502195220123082435
    Date: 8/30/2006 8:51:00 PM

    Nik: 10PTENC
    UID: 44552950
    ENC: 23502205220122182435
    Date: 8/30/2006 8:52:00 PM

    I hope this helps a little so we can eventually be able to decrypt all PT passwords from the registry. 😀

    #185270
    Ponies
    Member

    Interesting.

    #185269
    Admin
    Administrator

    Would be interesting if you could make a nik every second and see how the encryption changes for each second. Maybe a prog for that could be made, since its humanly impossible to fill out the for in less than a sec…lol…But maybe we dont need to make one for each second if we could find more patterns. Gotta keep messin wit it. 😀

    #185268
    Admin
    Administrator

    ok, so you stated that all nicks were entered exactly 60 seconds apart from each other…in that case, how do you know that the fourth number increases ever 60 seconds? it could be that it increases every time a new nick is entered into the registry…if so, that would make it that much harder to crack seeing as how you dont know how many nick are in the registry or if there was a nick that has been deleted from the registry…

    #185267
    Ponies
    Member

    all 11111

    10bbbvbfvv – 28902211228922212318

    10bbbvbfvv_1 – 22082218228022262311

    10bbbvbfvv_2 – 22152216228122222314

    made every 40 sec’s

    look’s random to me xD

    #185266
    DarkCoder
    Member

    but it can’t be random cause then paltalk client wouldn’t be able to decrypt it

    #185265
    MrAl3n
    Member

    Hmm well we suld look into it and get more info and maybe make a program wot u think justin ?

    #185264
    DarkCoder
    Member

    blah there is no point.. as soon as we decrypt it.. the next day after paltalk finds out we know how to do it.. the algorithim is going to be changed.. and all that work goes down the drain.

    #185263
    Ponies
    Member

    What if it include’s Something from the name xD

    #185262
    Admin
    Administrator

    Or, what if it changes with every computer ❓ or even every download ❓ it could be like the same type thing that syxx, made that thing where it would ‘dycriypt’ a scrambled message with a certain password…

    #185261
    MrAl3n
    Member

    Lets give it a shot and try

    #185260
    Ponies
    Member

    Welllllllllll… Go on then alen.

    Give it a shot and try.

    -Wait’s-

    #185259
    Admin
    Administrator

    I think it could be done if we all put our brains together in this…..check out how v3.1 encrypts PWs….they are still stored in the same registry but if u use the password decryptor program to see behind the ***** a password of 00000 comes out to Û~tÛm9Ûm5Ûm|ۍù and is the same alway…never changing….its 3 characters to every character instead of 4….. 😀

    #185258
    LoCNiNjA
    Member

    hey guys do alittle test to see what you find and if there is any significanse to this
    1. find the Ascii value for each letterin your password add them togeter and keep that to one side
    2.take the encypted password and / by the uID decimal from the registry
    take allthe numbers befor the desimalplace and / by the uID again and look at the begining numbers and the first numbers you added together i did this and they were the sam what i am saying is do you think that the encryption is using the user ID to encrypt the password hu i dont know what but it could be

    #185257
    Admin
    Administrator

    k…let us know when your done with that…

    @LoCNiNjA wrote:

    hey guys do alittle test to see what you find and if there is any significanse to this
    1. find the Ascii value for each letterin your password add them togeter and keep that to one side
    2.take the encypted password and / by the uID decimal from the registry
    take allthe numbers befor the desimalplace and / by the uID again and look at the begining numbers and the first numbers you added together i did this and they were the sam what i am saying is do you think that the encryption is using the user ID to encrypt the password hu i dont know what but it could be

Viewing 15 posts - 1 through 15 (of 26 total)
  • You must be logged in to reply to this topic.