new post here
This is a read-only snapshot of the ComputerCraft forums,
taken in April 2020.
LoganDark's Password Lock System
Started by LoganDark, 07 December 2015 - 01:39 AMPosted 07 December 2015 - 02:39 AM
I have no code to show here. Existing computers running my password lock will continue to function but will not show they are running my system.
new post here
new post here
Edited on 07 March 2016 - 10:48 PM
Posted 07 December 2015 - 04:59 AM
This is all great but…
Would be better using an actual one-way function like SHA256 for storing passwords.
The system also does not work, my correct password doesn't unlock the computer.
You can terminate it with ctrl+t despite you saying it can't.
Did you try your program before posting it?
The startup file also runs a pastebin link, which you can edit, and possibly replace with a virus or backdoor.
Edit: Seems you prefer editing your post rather than replying to the thread, here's my answer.
Rolling out patches like this seems like a good idea in theory, but for a password lock, security comes before convenience, you can't have the two at the same time.
Since you put your name in there, you can easily identify who uses your lock, the possibility for you to change the code and put a backdoor in to break into someones computer after rebooting is very real.
It might not be your intentions to do that, but directly running external code that can be modified without notice, I wouldn't put my trust into that.
It's not complicated at all, putting your encrypted password in the code() function will give you the original…Password is encrypted using secret code#-- Don't concentrate intensely on figuring out how the encryption system works. It's simple but complicated.
Would be better using an actual one-way function like SHA256 for storing passwords.
The system also does not work, my correct password doesn't unlock the computer.
You can terminate it with ctrl+t despite you saying it can't.
Did you try your program before posting it?
The startup file also runs a pastebin link, which you can edit, and possibly replace with a virus or backdoor.
Edit: Seems you prefer editing your post rather than replying to the thread, here's my answer.
Rolling out patches like this seems like a good idea in theory, but for a password lock, security comes before convenience, you can't have the two at the same time.
Since you put your name in there, you can easily identify who uses your lock, the possibility for you to change the code and put a backdoor in to break into someones computer after rebooting is very real.
It might not be your intentions to do that, but directly running external code that can be modified without notice, I wouldn't put my trust into that.
Edited on 07 December 2015 - 08:16 AM
Posted 07 December 2015 - 05:10 AM
Post removed
Edited on 09 December 2015 - 04:26 AM
Posted 07 December 2015 - 02:31 PM
Removed, because the errors have been fixed.
Edited on 11 December 2015 - 07:15 PM
Posted 07 December 2015 - 06:07 PM
Post removed
Edited on 09 December 2015 - 05:03 AM
Posted 07 December 2015 - 07:23 PM
Edit: Luca0208, please remove your post. I do not like people looking to publish a hack for my system. Please only post issues, not how to hack my system.
Fix it, then you don't longer have the problem. And no you don't need to decrypt something. I recommend you to do this:
Posted 07 December 2015 - 07:55 PM
There is a SHA API on the forums. If you can't find it, here is one. (This is the one forums, not by me.)
By the way, figuring out the wat to hack the system can be done by looking at the code. The only way to prevent this is by hashing passwords.
By the way, figuring out the wat to hack the system can be done by looking at the code. The only way to prevent this is by hashing passwords.
Posted 07 December 2015 - 09:25 PM
Luca0208, shortened/redirecting URLs are not allowed, please post a link to the ultimate destination when linking things.
Posted 07 December 2015 - 10:06 PM
A true one-way hash creates the same output for the same input; different output for different input; and doesn't need to be reversed if implemented properly, simply compare the hashed outputs.
EDIT: you're coding is simple rot 13 it seems, but for numbers it is in reverse order, this is way too easy to crack the password from the file (besides disk startup IMO ruins the idea of password locks).
EDIT 2: direct pastebin link for his program: http://pastebin.com/qKcNunWN
EDIT 3: also you're free to use the snippet of the java hashcode function found here: http://pastebin.com/duwcL34w
EDIT 4: also there's free hosting out there (such as google app engine)
Response to a hack: A way to hack a system is an issue, a major one actually.Edit: Luca0208, please remove your post. I do not like people looking to publish a hack for my system. Please only post issues, not how to hack my system.
EDIT: you're coding is simple rot 13 it seems, but for numbers it is in reverse order, this is way too easy to crack the password from the file (besides disk startup IMO ruins the idea of password locks).
EDIT 2: direct pastebin link for his program: http://pastebin.com/qKcNunWN
EDIT 3: also you're free to use the snippet of the java hashcode function found here: http://pastebin.com/duwcL34w
EDIT 4: also there's free hosting out there (such as google app engine)
Edited on 07 December 2015 - 09:33 PM
Posted 07 December 2015 - 10:09 PM
Exactly. You have my respect, sir!
Posted 08 December 2015 - 02:27 AM
Post removed
Edited on 09 December 2015 - 04:27 AM
Posted 08 December 2015 - 04:20 AM
That's the thing, if you don't have a sense for security, you shouldn't do security at all.
Yes a password lock is a great beginner thing to write, but posting it on the forum with the label "Cannot be terminated, encrypted with secret code" when these statement are just false is just…
Now I did not say that you're bad and you should quit, not at all, all I did is point out potential security issues in hope to enlighten potential users looking for a good password lock.
Fact is that most people playing with CC plays on a server that provides some kind of claim security that prevents other player from placing blocks and thus bypassing protections.
In that case preventing termination is good enough, you could store the password unaltered if you so desire.
The reason why most of the people are using un-reversible hashes like SHA2 is mostly for prevention in case you forgot to re-lock your computer, and someone sneaks up and learns your password in hope you re-use the same in other places.
You also say that were dumbasses who can't undertand that your security can always be reverse engineered.
But what you don't understand is that we've been suggesting you to use something like SHA2 instead, which is used for real-world application, and is made hard, even impossible to reverse.
Yes a password lock is a great beginner thing to write, but posting it on the forum with the label "Cannot be terminated, encrypted with secret code" when these statement are just false is just…
Now I did not say that you're bad and you should quit, not at all, all I did is point out potential security issues in hope to enlighten potential users looking for a good password lock.
Fact is that most people playing with CC plays on a server that provides some kind of claim security that prevents other player from placing blocks and thus bypassing protections.
In that case preventing termination is good enough, you could store the password unaltered if you so desire.
The reason why most of the people are using un-reversible hashes like SHA2 is mostly for prevention in case you forgot to re-lock your computer, and someone sneaks up and learns your password in hope you re-use the same in other places.
You also say that were dumbasses who can't undertand that your security can always be reverse engineered.
But what you don't understand is that we've been suggesting you to use something like SHA2 instead, which is used for real-world application, and is made hard, even impossible to reverse.
Edited on 08 December 2015 - 03:22 AM
Posted 08 December 2015 - 04:27 AM
No code to show, locked.
Threads merged and re-opened.
Threads merged and re-opened.
Posted 09 December 2015 - 05:23 AM
I haven't tested it, but I did see one thing in your code that I'd recommend doing differently.
On line 189 you set os.pullEvent = os.pullEventRaw but you don't backup os.pullEvent or restore it when the script is done. This will disable CTRL-T for everything on that computer until a restart (which will run your login and disable CTRL-T again).
I'd recommend doing the following. On line 189 backup os.pullEvent before pointing it os.pullEventRaw…
Then at the end of your code, restore os.pullEvent so the computer operates as expected…
On line 189 you set os.pullEvent = os.pullEventRaw but you don't backup os.pullEvent or restore it when the script is done. This will disable CTRL-T for everything on that computer until a restart (which will run your login and disable CTRL-T again).
I'd recommend doing the following. On line 189 backup os.pullEvent before pointing it os.pullEventRaw…
local oldPullEvent = os.pullEvent
os.pullEvent = os.pullEventRaw
Then at the end of your code, restore os.pullEvent so the computer operates as expected…
os.pullEvent = oldPullEvent
Edited on 09 December 2015 - 04:23 AM
Posted 09 December 2015 - 05:31 AM
I haven't tested it, but I did see one thing in your code that I'd recommend doing differently.
On line 189 you set os.pullEvent = os.pullEventRaw but you don't backup os.pullEvent or restore it when the script is done. This will disable CTRL-T for everything on that computer until a restart (which will run your login and disable CTRL-T again).
I'd recommend doing the following. On line 189 backup os.pullEvent before pointing it os.pullEventRaw…local oldPullEvent = os.pullEvent os.pullEvent = os.pullEventRaw
Then at the end of your code, restore os.pullEvent so the computer operates as expected…os.pullEvent = oldPullEvent
Oh, sorry. I seem to have forgotten the fact that the os.pullEvent is global. Silly me, fixed. Restarting the computer will apply the patch.
Also, not to be rude or anything, but you do not have to provide a method to restore it. I can figure things out on my own.
P.S. You did not offend me, what I have written may suggest you have.
Edited on 09 December 2015 - 04:32 AM
Posted 09 December 2015 - 05:37 AM
Next time, try to explain to me how to use the algorithm. I'm not good at figuring things out unless you point out that I need to.
Edited on 01 February 2016 - 05:16 PM
Posted 13 December 2015 - 10:38 PM
Post removed
Edited on 01 February 2016 - 05:15 PM
Posted 13 December 2015 - 11:01 PM
If I were you, I'd interpret it as "Make your lock worthy of being used by the community." Don't take it as an insult.
Posted 14 December 2015 - 12:44 AM
I'm sorry that you get easily offended by criticism, I wrote a whole paragraph trying to make it as much constructive as possible.So you're saying users should detour from my password lock and find another one that's "better"?… in hope to enlighten potential users looking for a good password lock …
That's you saying I'm bad and I should quit.
You offended me deeply…
What I mean by that is I wanted to notice users that your code didn't have any protections against termination, despite you stating it did, (it does now, but not in your first version).
Of course nobody is going to want a security system that's bypassable in the simplest of ways.
Edited on 13 December 2015 - 11:48 PM
Posted 14 December 2015 - 03:52 AM
Sorry, post removed
Edited on 24 December 2015 - 07:11 AM
Posted 14 December 2015 - 05:34 AM
Told you to add what?You could've just told me what to improve and what to add, but instead, you chose to offend me…
Not only did you put the anti-termination by yourself later, but you also stated in your thread that it was already not terminatable, so clearly you knew what to do.
I'm done talking to you, I've been trying to be pacifist the whole way, even wished you good luck in that PM I sent you, but you seem to be dramatizing each and every sentence I make.
Edited on 14 December 2015 - 04:36 AM
Posted 14 December 2015 - 06:58 AM
Dude, I'm sorry. I forgot to add the termination, but thought I added it.
I'm not trying to offend you, I'm not saying what you're doing is wrong, I'm just saying you offended me by accident.
I overreact easily…
I'm not trying to offend you, I'm not saying what you're doing is wrong, I'm just saying you offended me by accident.
I overreact easily…
Posted 14 December 2015 - 07:58 AM
you chose to offend me…
I'm not sure anymore…you offended me by accident.
But anyways, the lock looks great now :)/>
About sha512, nobody has implemented it in CC yet, and sha256 is just as secure.
It's also much slower than sha256.
Edited on 14 December 2015 - 07:02 AM
Posted 14 December 2015 - 04:11 PM
I'm not sure anymore…
I'm sorry.
Posted 04 January 2016 - 06:09 PM
No feedback?
Posted 05 January 2016 - 12:06 AM
Just tested it on an advanced computer. I think the only gripe I can make about it is that it's unpolished. It functions exactly as it should, but I feel it looks a bit bare. Also, it would be a bit better if you shortened the sleep() calls after a successful password entry.
Oh, and in MY password lock, you can have multiple passwords by doing string.find() on the whole password file, where each password is separated by a newline! Like, in case you have your super secret password used on that lock and you don't want your roommate to know it.
Oh, and in MY password lock, you can have multiple passwords by doing string.find() on the whole password file, where each password is separated by a newline! Like, in case you have your super secret password used on that lock and you don't want your roommate to know it.
amnt = 10 --amount of 'heh's
write("Nyeh ") --header. not counted in amnt
for a = 1, amnt do
write("heh")
if a ~= amnt then --to make sure that there is proper spacing
write(" ")
else
write("!!!!") --end punctuation
end
end
Edited on 04 January 2016 - 11:09 PM
Posted 08 January 2016 - 09:39 PM
I'm going to try recoding the entire thing.
Edited on 08 January 2016 - 08:40 PM
Posted 13 January 2016 - 07:51 PM
http://pastebin.com/qKcNunWN
Is this a backdoor I see at line 262?
Is this a backdoor I see at line 262?
The startup file also runs a pastebin link, which you can edit, and possibly replace with a virus or backdoor.
Edited on 13 January 2016 - 06:54 PM
Posted 13 January 2016 - 07:54 PM
Yes it is.http://pastebin.com/qKcNunWN
Is this a backdoor I see at line 262?The startup file also runs a pastebin link, which you can edit, and possibly replace with a virus or backdoor.
Posted 13 January 2016 - 08:36 PM
Now just about no one will probably be using your code if they know that you have a way into their computer if you so desire. There is no POSSIBLE reason why someone would use your code if they're gonna be in the same server as you. The ability to unlock a 'secure' lock with a backdoor is contradictory towards the point of the lock in the first place. More than likely, in your code's current state, you'll probably be getting just about 0 downloads of your code for an actual use.
Most people would look elsewhere on the forums to find a more secure lock. I mean hell, I made one a long time ago, was just a door lock really, sha256, multiple users. Wasn't hard to implement, however I never decided to put in a back door because why do it. There is literally no reason for you to have a back door into a program that you're not going to run yourself.
If someone were to figure out your "super secret password" your lock would be finished, that person wouldn't have to disclose that they knew it, AND they'd be able to get into anyone's computer that uses your lock.
Knowing what the hash result is, it wouldn't take me long to write up a brute force. Probably wouldn't take it long to figure it out too.
Most people would look elsewhere on the forums to find a more secure lock. I mean hell, I made one a long time ago, was just a door lock really, sha256, multiple users. Wasn't hard to implement, however I never decided to put in a back door because why do it. There is literally no reason for you to have a back door into a program that you're not going to run yourself.
If someone were to figure out your "super secret password" your lock would be finished, that person wouldn't have to disclose that they knew it, AND they'd be able to get into anyone's computer that uses your lock.
Knowing what the hash result is, it wouldn't take me long to write up a brute force. Probably wouldn't take it long to figure it out too.
Edited on 13 January 2016 - 07:52 PM
Posted 13 January 2016 - 11:01 PM
Edit 2: You have a good point, I'll remove it immediately
Luckily, all affected computers can be restarted to apply the change. Now do you understand why I made the loader load from pastebin?
Edited on 13 January 2016 - 11:30 PM
Posted 13 January 2016 - 11:12 PM
-snip-
Knowing what the hash result is, it wouldn't take me long to write up a brute force. Probably wouldn't take it long to figure it out too.
You don't know how long that is.
LoganDarkthisisalongpassword
Crappy password but without logic, very hard to crack
Posted 14 January 2016 - 12:35 AM
Surprisingly enough, I happen to be in very close contact with him. I'll make sure he removes it, and it DOES get annoying because he managed to use it to hack into my computer about 100 times, EVEN when I told him not to. Naughty naughty…
EDIT: I realized that he removed the secret password that he told me, so there should be no reason to be able to hack into the computers I use.
BEFORE you use this comment against him, read the spoiler below:
EDIT: I realized that he removed the secret password that he told me, so there should be no reason to be able to hack into the computers I use.
BEFORE you use this comment against him, read the spoiler below:
Spoiler
You cannot use this as a thing against him, he was playing a practical joke, even after I asked him not to, and that's what friends do.Edited on 13 January 2016 - 11:49 PM
Posted 14 January 2016 - 12:42 AM
:mellow:/>
Edited on 13 January 2016 - 11:43 PM
Posted 14 January 2016 - 12:45 AM
Here's a good test to see if a lock is good: see if you can lock yourself out completely.
Posted 14 January 2016 - 12:57 AM
Sorry, content creeper'd
Edited on 04 March 2016 - 07:00 PM
Posted 14 January 2016 - 01:02 AM
Sorry, content creeper'd
Edited on 14 January 2016 - 12:09 AM
Posted 14 January 2016 - 01:03 AM
Sorry, content creeper'd
Edited on 14 January 2016 - 12:10 AM
Posted 14 January 2016 - 01:10 AM
Do'h. Failed.Sorry, content creeper'd
Edited on 14 January 2016 - 12:11 AM
Posted 14 January 2016 - 01:17 AM
A practical joke which is also practical for actually bypassing, for malicious intent, even though it's not his goal.You cannot use this as a thing against him, he was playing a practical joke, even after I asked him not to, and that's what friends do.
What he could've done is send you a private version instead of the public one.
But hey, can't blame me, I warned you about it since my first post.
The startup file also runs a pastebin link, which you can edit, and possibly replace with a virus or backdoor.
Edited on 14 January 2016 - 12:26 AM
Posted 14 January 2016 - 01:25 AM
I will note that he did NOT warn me and shown me this post before he told me about it and let me install it on my computers.A practical joke which is also practical for actually bypassing, for malicious intent, even though it's not his goal.You cannot use this as a thing against him, he was playing a practical joke, even after I asked him not to, and that's what friends do.
What he could've done is send you a version that is not from the forum thread.
But hey, can't blame me, I warned you about it since my first post.The startup file also runs a pastebin link, which you can edit, and possibly replace with a virus or backdoor.
Turns out that was a mistake before he removed the backdoor, or whatever it's called.
Posted 14 January 2016 - 10:17 AM
Not hard, time consuming. with your password you have 52^28 different possibilities at that length, and that's without symbols or spaces. Running my brute force that I was using, I was implementing symbols into it, so it would of taken 93^28 possible permutations until it found your password. running it now, it's still going to take a long time. So I guess we'll see.Crappy password but without logic, very hard to crack
Running the brute force I made, I'm at 5 digits with only capital and lowercase letters. It still will take the computer over 52^27 permutations to get your password. Given what I've been using to actually do so, making it count up in digits amount, it's actually more of 53^28 - 1 permutations.
Edited on 14 January 2016 - 02:38 PM
Posted 14 January 2016 - 06:15 PM
You are desperately trying to crack a password that isn't there anymore.Running the brute force I made, I'm at 5 digits with only capital and lowercase…Crappy password but without logic, very hard to crack
You'd be better off trying a dictionary attack before anything else, otherwise you're wasting time and power.
Edited on 14 January 2016 - 05:17 PM
Posted 14 January 2016 - 07:42 PM
A dictionary attack wouldn't work with the password he's already provided. A dictionary attack is easily defeated anyways by a password that differs from the norm as well as salting. I already know that it will take a long time to crack the known password. But I find it a fun exercise to attempt it anyways.You are desperately trying to crack a password that isn't there anymore.
You'd be better off trying a dictionary attack before anything else, otherwise you're wasting time and power.
Posted 14 January 2016 - 08:44 PM
Sorry, not at all. If you wouldn't have that pastebin thing there, you wouldn't have been able to put a backdoor in, which would've saved you a lot of trouble, because I won't trust you anymore, we don't know if you really just put the backdoor in for debugging, you could also put it back in and I want my computer 100% Save, not having to trust ANYONE.Now do you understand why I made the loader load from pastebin?
Posted 14 January 2016 - 11:12 PM
If you want to not trust me, go ahead and grab the code itself instead of the loader. It's not like I'm going to use it for evil anyway.Sorry, not at all. If you wouldn't have that pastebin thing there, you wouldn't have been able to put a backdoor in, which would've saved you a lot of trouble, because I won't trust you anymore, we don't know if you really just put the backdoor in for debugging, you could also put it back in and I want my computer 100% Save, not having to trust ANYONE.Now do you understand why I made the loader load from pastebin?
I'll never put in a backdoor if it means it will compromise my security system. I intended it as a joke, and not as a real way to abuse the system. I understand my mistake and I will never make it again.
Slower is better, it will make brute-force harder.-snip-
It's also much slower than sha256.
Edited on 14 January 2016 - 10:13 PM
Posted 15 January 2016 - 02:12 AM
I do believe you won't, but the thing is, the way your lock is made do makes it possible, since you did exactly that, as a joke to a friend.It's not like I'm going to use it for evil anyway.
But as a security standpoint, that's unacceptable.
If you really want an update mechanism on your lock, it would be best to do it after authentication has been made, and that goes for most programs.
Posted 04 March 2016 - 08:02 PM
This thread hasn't been active for a while; anything anyone has to say? How do they use my system (if at all because my ex-friend virtually ruined my reputation by explaining what I did in the worst way possible)? Any issues?
You're saying I won't remove it, and that I'm naughty, and that I broke into your computers with bad intentions. It was a joke. I wouldn't use it for evil. Not trying to be greedy here, but youpretty much completely ruined my reputation. If somebody reads your post, they probably will leave because of how bad of a job you did explaining how I used it. You assumed I was a bad, horrible, heartless person. I won't accept this.
Surprisingly enough, I happen to be in very close contact with him. I'll make sure he removes it, and it DOES get annoying because he managed to use it to hack into my computer about 100 times, EVEN when I told him not to. Naughty naughty…
EDIT: I realized that he removed the secret password that he told me, so there should be no reason to be able to hack into the computers I use.
BEFORE you use this comment against him, read the spoiler below:Spoiler
You cannot use this as a thing against him, he was playing a practical joke, even after I asked him not to, and that's what friends do.
You're saying I won't remove it, and that I'm naughty, and that I broke into your computers with bad intentions. It was a joke. I wouldn't use it for evil. Not trying to be greedy here, but you
Edited on 04 March 2016 - 07:32 PM