|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 135
Members: 0
Total: 135
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
|
I need the password recovered for:
$P$Bdt2sa.P5Ouaf0vknR9noo7fDCE0oq1 |
|
|
|
|
I know blowfish likes similar but hard to say if this is blowfish |
|
|
|
|
also you should clean up your list.
There are serveral NOT md5 hashes in there
MD5 is A-F 0-9 only |
|
|
|
|
all of them expect a few
This is the list of cryptohaze.com export list.
Currently I run a bruteforce on them. (also there are some hashes in the list that aren't md5) |
|
|
|
|
kinda weird, if you compare the password with the md5 mostly all aren't the right password... |
|
|
|
|
This isn't realy the right place to ask.
I can't answer your question, because I'm nog familiar with vbulletin |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|