Calgarypuck Forums - The Unofficial Calgary Flames Fan Community
Old 06-06-2012, 04:45 PM   #21
bomber317
Powerplay Quarterback
 
bomber317's Avatar
 
Join Date: Jan 2008
Location: Calgary
Exp:
Default

Quote:
Originally Posted by yads View Post
You can check if your password was compromised at http://leakedin.org
I don't trust putting my password in that site. I did however put in

P@ssw0rd and that was leaked.
bomber317 is offline   Reply With Quote
Old 06-06-2012, 05:23 PM   #22
psyang
Powerplay Quarterback
 
Join Date: Jan 2010
Exp:
Default

If you want to check without entering your password to a website, here's a way I checked in Chrome (my password wasn't leaked). With small changes, this would probably work in Firefox/IE/other modern browser:

1) Open Chrome. No need to browse to a site.
2) Press Ctrl-Shift-j. This will open the Chrome debugger.
3) Click the Console button in the top toolbar of the debugger.
4) Copy the following javascript code (taken from http://www.webtoolkit.info/javascript-sha1.html , and paste it in the console window, and hit enter.
Code:
/**
*
*  Secure Hash Algorithm (SHA1)
*  http://www.webtoolkit.info/
*
**/
 
function SHA1 (msg) {
 
	function rotate_left(n,s) {
		var t4 = ( n<<s ) | (n>>>(32-s));
		return t4;
	};
 
	function lsb_hex(val) {
		var str="";
		var i;
		var vh;
		var vl;
 
		for( i=0; i<=6; i+=2 ) {
			vh = (val>>>(i*4+4))&0x0f;
			vl = (val>>>(i*4))&0x0f;
			str += vh.toString(16) + vl.toString(16);
		}
		return str;
	};
 
	function cvt_hex(val) {
		var str="";
		var i;
		var v;
 
		for( i=7; i>=0; i-- ) {
			v = (val>>>(i*4))&0x0f;
			str += v.toString(16);
		}
		return str;
	};
 
 
	function Utf8Encode(string) {
		string = string.replace(/\r\n/g,"\n");
		var utftext = "";
 
		for (var n = 0; n < string.length; n++) {
 
			var c = string.charCodeAt(n);
 
			if (c < 128) {
				utftext += String.fromCharCode(c);
			}
			else if((c > 127) && (c < 2048)) {
				utftext += String.fromCharCode((c >> 6) | 192);
				utftext += String.fromCharCode((c & 63) | 128);
			}
			else {
				utftext += String.fromCharCode((c >> 12) | 224);
				utftext += String.fromCharCode(((c >> 6) & 63) | 128);
				utftext += String.fromCharCode((c & 63) | 128);
			}
 
		}
 
		return utftext;
	};
 
	var blockstart;
	var i, j;
	var W = new Array(80);
	var H0 = 0x67452301;
	var H1 = 0xEFCDAB89;
	var H2 = 0x98BADCFE;
	var H3 = 0x10325476;
	var H4 = 0xC3D2E1F0;
	var A, B, C, D, E;
	var temp;
 
	msg = Utf8Encode(msg);
 
	var msg_len = msg.length;
 
	var word_array = new Array();
	for( i=0; i<msg_len-3; i+=4 ) {
		j = msg.charCodeAt(i)<<24 | msg.charCodeAt(i+1)<<16 |
		msg.charCodeAt(i+2)<<8 | msg.charCodeAt(i+3);
		word_array.push( j );
	}
 
	switch( msg_len % 4 ) {
		case 0:
			i = 0x080000000;
		break;
		case 1:
			i = msg.charCodeAt(msg_len-1)<<24 | 0x0800000;
		break;
 
		case 2:
			i = msg.charCodeAt(msg_len-2)<<24 | msg.charCodeAt(msg_len-1)<<16 | 0x08000;
		break;
 
		case 3:
			i = msg.charCodeAt(msg_len-3)<<24 | msg.charCodeAt(msg_len-2)<<16 | msg.charCodeAt(msg_len-1)<<8	| 0x80;
		break;
	}
 
	word_array.push( i );
 
	while( (word_array.length % 16) != 14 ) word_array.push( 0 );
 
	word_array.push( msg_len>>>29 );
	word_array.push( (msg_len<<3)&0x0ffffffff );
 
 
	for ( blockstart=0; blockstart<word_array.length; blockstart+=16 ) {
 
		for( i=0; i<16; i++ ) W[i] = word_array[blockstart+i];
		for( i=16; i<=79; i++ ) W[i] = rotate_left(W[i-3] ^ W[i-8] ^ W[i-14] ^ W[i-16], 1);
 
		A = H0;
		B = H1;
		C = H2;
		D = H3;
		E = H4;
 
		for( i= 0; i<=19; i++ ) {
			temp = (rotate_left(A,5) + ((B&C) | (~B&D)) + E + W[i] + 0x5A827999) & 0x0ffffffff;
			E = D;
			D = C;
			C = rotate_left(B,30);
			B = A;
			A = temp;
		}
 
		for( i=20; i<=39; i++ ) {
			temp = (rotate_left(A,5) + (B ^ C ^ D) + E + W[i] + 0x6ED9EBA1) & 0x0ffffffff;
			E = D;
			D = C;
			C = rotate_left(B,30);
			B = A;
			A = temp;
		}
 
		for( i=40; i<=59; i++ ) {
			temp = (rotate_left(A,5) + ((B&C) | (B&D) | (C&D)) + E + W[i] + 0x8F1BBCDC) & 0x0ffffffff;
			E = D;
			D = C;
			C = rotate_left(B,30);
			B = A;
			A = temp;
		}
 
		for( i=60; i<=79; i++ ) {
			temp = (rotate_left(A,5) + (B ^ C ^ D) + E + W[i] + 0xCA62C1D6) & 0x0ffffffff;
			E = D;
			D = C;
			C = rotate_left(B,30);
			B = A;
			A = temp;
		}
 
		H0 = (H0 + A) & 0x0ffffffff;
		H1 = (H1 + B) & 0x0ffffffff;
		H2 = (H2 + C) & 0x0ffffffff;
		H3 = (H3 + D) & 0x0ffffffff;
		H4 = (H4 + E) & 0x0ffffffff;
 
	}
 
	var temp = cvt_hex(H0) + cvt_hex(H1) + cvt_hex(H2) + cvt_hex(H3) + cvt_hex(H4);
 
	return temp.toLowerCase();
 
}
5) Type: SHA1('<your password here>') into the console window and hit enter
6) A hash of your password will appear. It will look like a long string of letters and numbers. For instance, SHA1('Hello') will result in a hash of f7ff9e8b7bb2e09b70935a5d785e0cc5d9d0abf0
7) Enter the hash into the leakedin.org site. Hopefully you will see this message:


This method doesn't make you type your password into any online site (you can unplug your computer from the internet while doing steps 1-6 if you are really paranoid). Main thing is to enter your password's hash into the leakedin.org site, not your actual password. Sha1 hashes are one-way, so given a hash, you can't reverse the hash algorithm to get the password that created the hash (passwords are normally broken using brute force or rainbow tables - huge lists of known strings and the hashes they produce). Also, entering the hash into the leakedin.org site does not link your username to the hash, so it is (for all intents and purposes) a random string.
psyang is offline   Reply With Quote
Old 06-06-2012, 06:44 PM   #23
Wormius
Franchise Player
 
Wormius's Avatar
 
Join Date: Feb 2011
Location: Somewhere down the crazy river.
Exp:
Default

Quote:
Originally Posted by Hesla View Post
My linkedin password was only a duplicate of my CP password. So if any of my posts become erratic/crazy it is because someone has my password.
<drum roll>

Somebody hacked your password a few months ago!
Wormius is offline   Reply With Quote
The Following User Says Thank You to Wormius For This Useful Post:
Old 06-07-2012, 09:53 AM   #24
yads
Powerplay Quarterback
 
Join Date: Apr 2008
Exp:
Default

Quote:
Originally Posted by bomber317 View Post
I don't trust putting my password in that site. I did however put in

P@ssw0rd and that was leaked.
I checked their javascript code and the password is hashed before it is sent to the site. In fact it is hashed when you click anywhere in the window, prior to hitting the submit button. Alternatively you can do what psyang suggests.
yads is offline   Reply With Quote
The Following User Says Thank You to yads For This Useful Post:
Old 06-07-2012, 03:11 PM   #25
bizaro86
Franchise Player
 
bizaro86's Avatar
 
Join Date: Sep 2008
Exp:
Default

Interesting. My work firewall has it blocked as a phishing site.
bizaro86 is offline   Reply With Quote
Reply

Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -6. The time now is 01:40 PM.

Calgary Flames
2024-25




Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Copyright Calgarypuck 2021 | See Our Privacy Policy