|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 63
Members: 0
Total: 63
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
|
yea u can use http://pastebin.com/
Is nobody interested in this? |
|
|
|
|
yea u can use http://pastebin.com/
http://pastebin.com/VGTkSP69
Done. |
|
|
|
|
why dont u post the hash's+salt here
All 1500? |
|
|
|
|
Question 1
You cannot modify the database to show the plaintext passwords. You need to crack the md5 hashes or install a logger on the site that logs the
plaintext into a database/file/...
Que ... |
|
|
|
|
I have successfully negotiated to the relevant tables and exported all of the 2000 usernames / passwords etc to an excel file.
The passwords are hashed (MD5) and salt. I have the salt information ... |
|
|
|
|
Amazing - I am not even going to ask how you did it.
Thankyou |
|
|
|
|
Hey guys, one of the ethical hacking forums said this is the place to go if you are having trouble cracking an MD5 with salt.
I am completely out of ideas so if anyone could help that would be perf ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|