NickServ Identify helper

Platform:  mIRC
Published  Aug 22, 2011
Updated  Aug 22, 2011
This is a NickServ Identify helper.

How it works
Do you also hate it when you lose your nickserv password?
This litle snippet will help you with remembering it.
You can set a password for every network.
If you forgot your password you can type /getpass to get the password for the current network.
There is also a /delpass which removed the password for the current network

Commands
/setpass <password here> Sets the password for the auto identify.
/getpass Returns the password of the current network
/delpass Removed the password of the current network ;- Nickserv identify helper
;- Code from Aha2Y
;- Script from hawkee.com

;-The alias which sets the password.
alias setpass {
writeini auth.ini $network password $1
echo 3* NickServ password updated for $network
}

;-The alias which returns the password.
alias getpass {
if ($readini(auth.ini, $network, password) == $null) {
echo -a 3* There is no password saved for $network $+ . }
else {
echo -a 3* The nick password for $network is $readini(auth.ini, $network, password)
}
}

;-The alias for removing a password.
alias delpass {
if ($readini(auth.ini, $network, password) == $null) {
echo -a 3* There is no password saved for $network $+ . }
else {
echo -a 3* The nick password for $network is deleted!
remini auth.ini $network
}
}

;- The Auto Identify.
on *:connect:{
if ($readini(auth.ini, $network, password) == $null) { halt }
else {
msg nickserv id $readini(auth.ini, $network, password)
}
}

Comments

Sign in to comment.
Savage_CL   -  Aug 28, 2011
Aha2y, most people that know how to do that have mIRC and they can just decode it on their end. Unless you do an array of encodings, and even then the only protection is people not knowing the array, it makes no difference. if you do want to go that route, I've got a couple ideas. Talk to me in #savage_CL.
 Respond  
Aha2Y   -  Aug 25, 2011
Look at a !cmd <- which is public (by a mIRC newby) and someone try's !cmd msg #channel $readini(password.ini, $network, password) - Which will return the password!
 Respond  
Aha2Y   -  Aug 25, 2011
I thought it would be usefull when the password is encrypted saved to a file, and not in plaintext.
 Respond  
_Dean_   -  Aug 23, 2011

jaytea: if he is using the encode to keep it safe, then anybody with mirc can decode itm


if he is the only person with the access to that, no one else on the entire world can decode that
cause, the /getpass will only return it to user

by the way, i really dont see a need for an encode option
 Respond  
Matcou   -  Aug 23, 2011
jaytea: if he is using the encode to keep it safe, then anybody with mirc can decode itm
 Respond  
Wader   -  Aug 23, 2011
There is no way to use secure encryption and then decrypt it easily. When you make password/login system you would normally write a hash to a database, then when someone wants to login you encrypt the password they put into the login system and compare it against whats already in the database from when they registered.

You would only need to encrypt a password where theres more than the owner given the ability to use the software, i.e: theres multipul users in such system like hawkee, facebook, forums, etc as there could be security flaws that could mean password hashes get exposed. And thats the whole idea of hashing a password so if they do get exposed they are extremly difficult to decrypt.

I cant see the need to encrypt this with an md5, if any encryption at all, if the only user is going to be the person using the script.
 Respond  
Aha2Y   -  Aug 23, 2011

@Aha2Y mIRC creates the hash with $md5 and returns it. However there is no way in mIRC, or infact any *easy* way to decrypt/crack an md5 hash. Normally when using md5 with passwords you just compare the hash in the database with the hash of what the user has inputted.

Then the password will be added in a database as plaintext :|

Im going to do a research for a Secured encryption :)
 Respond  
Wader   -  Aug 23, 2011
@Aha2Y mIRC creates the hash with $md5 and returns it. However there is no way in mIRC, or infact any *easy* way to decrypt/crack an md5 hash. Normally when using md5 with passwords you just compare the hash in the database with the hash of what the user has inputted.
 Respond  
_Dean_   -  Aug 23, 2011

The $md5 identifer only returns md5 hash.
I searched the help file, but there is no identifer for creating a md5 hash.


what exactly do you want?

you can use

Code
 


but encrypting it with $md5 wil not help in nothing
since if the person use the /getpass command, all it will return is the md5 hash... which you cant decrypt
 Respond  
Aha2Y   -  Aug 23, 2011
You should experiment with $md5() instead.


The $md5 identifer only returns md5 hash.
I searched the help file, but there is no identifer for creating a md5 hash.
 Respond  
_Dean_   -  Aug 22, 2011



You should experiment with $md5() instead.


how would he then get the password?


i just wondered the same thing... if he saves it into a INI file, how could he can get the pass again, without a cracker? (if the pass exist on the cracker database)
 Respond  
jaytea   -  Aug 22, 2011

You should experiment with $md5() instead.


how would he then get the password?


Using $en/decode will not help considering anybody can decode it


who is 'anybody'?
 Respond  
Jethro   -  Aug 22, 2011
You should experiment with $md5() instead.
 Respond  
Matcou   -  Aug 22, 2011
Using $en/decode will not help considering anybody can decode it
 Respond  
Wader   -  Aug 22, 2011
Doesnt mIRC have this feature built in, customized for each server/network >.> <.<

I wouldnt use "/ns id pass" in an on connect event, i would suggest matching the notice text to insert your password, that way if you change nicks you will be automatically identified when it prompts you for a password, rather than when connecting.
 Respond  
Savage_CL   -  Aug 22, 2011
I suggest using $encode and $decode, just for safety.
 Respond  
Are you sure you want to unfollow this person?
Are you sure you want to delete this?
Click "Unsubscribe" to stop receiving notices pertaining to this post.
Click "Subscribe" to resume notices pertaining to this post.