I recently obtained the l0pht-CD for windows and tried it out on my PC and <strong>It WORKS!!</strong>
<blockquote>
<a href="http://2600hertz.wordpress.com/2009/12/22/100-windows-xp-vista-7-password-recovery/" rel="nofollow noreferrer">2600hertz.wordpress.com/2009/12/22/100-windows-xp-vista-7-password-recovery</a>
</blockquote>
<ul>
<li>I have also read
<a href="http://kestas.kuliukas.com/RainbowTables/" rel="nofollow noreferrer">kestas.kuliukas.com/RainbowTables/</a></li>
</ul>
I'm designing a "Login-Simulator" that stores pwd-s in a similar manner. The current implementation will be vulnerable to the above attack. Plz could anyone illustrate (in as simple terms as possible), how to strengthen against such a rainbow tables attack.
<strong>MY GOAL : Build "Login-Simulator" to be as secure as possible.</strong> (Read Hacking Competition ;-) )
Thank You.
<blockquote>
<a href="http://2600hertz.wordpress.com/2009/12/22/100-windows-xp-vista-7-password-recovery/" rel="nofollow noreferrer">2600hertz.wordpress.com/2009/12/22/100-windows-xp-vista-7-password-recovery</a>
</blockquote>
<ul>
<li>I have also read
<a href="http://kestas.kuliukas.com/RainbowTables/" rel="nofollow noreferrer">kestas.kuliukas.com/RainbowTables/</a></li>
</ul>
I'm designing a "Login-Simulator" that stores pwd-s in a similar manner. The current implementation will be vulnerable to the above attack. Plz could anyone illustrate (in as simple terms as possible), how to strengthen against such a rainbow tables attack.
<strong>MY GOAL : Build "Login-Simulator" to be as secure as possible.</strong> (Read Hacking Competition ;-) )
Thank You.