|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 67
Members: 0
Total: 67
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
jhax |
|
Replies: 2 |
Views: 4939 |
|
|
|
|
|
|
Anyone gave this a shot? Maybe didn't worked for you, but please post what you tried to shorten my try. Cheers |
|
|
|
jhax |
|
Replies: 8 |
Views: 7084 |
|
|
|
|
|
|
Erm, before you start bruteforcing you should check a few simple things, like the length of the hashes.
"echo <your hash> | wc -m" gives 31, which means its obviously not a pure md5 hash, as ... |
|
|
|
jhax |
|
Replies: 8 |
Views: 7084 |
|
|
|
|
|
|
$db->query_write("
INSERT INTO " . TABLE_PREFIX . "user
(username, salt, password, email, usertitle, joindate, lastvisit, lastactivity, usergroupid, passworddate, ... |
|
|
|
jhax |
|
Replies: 8 |
Views: 7084 |
|
|
|
|
|
|
It should be md5(md5(pass)+salt) - maybe they changed it thou, download a copy and check the source. Thats the best way |
|
|
|
jhax |
|
Replies: 2 |
Views: 4939 |
|
|
|
|
|
|
If it helps to speed it up, I already tried to bruteforce 1-5 character passwords (a-z A-z 0-9 and symbols). |
|
|
|
jhax |
|
Replies: 2 |
Views: 4939 |
|
|
|
|
|
|
Hash: adbb971966afcbafb78b80d59f200fd2
Salt: >|E[m
I'd appreciate it if someone could explain to me how to setup PasswordsPro properly, so it does <word><number><number> in ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|