|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 72
Members: 0
Total: 72
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
MD5 hashes |
|
Posted: Tue May 22, 2007 5:25 am |
|
|
bean703 |
Regular user |
|
|
Joined: Mar 21, 2007 |
Posts: 22 |
|
|
|
|
|
|
|
Could someone please crack these for me I really need them:
da3b8a1cb012cd8ad47c589bda5b29ca
f6371485b4775d51beb2a836d7b18cda
7386457c34f49193c836998e71a9a377
fb86d943187e050d6e7822fed50ca028
They are unsalted hashes from a forum.
I have already tried:
all characters 1-6
upper alphanumeric 7-8
lower alphanumeric 7-8
numeric 9-12
Below are all of the characters that can be in a password:
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 !@#$%^&*()-_+=~`[]{}|:;<>,.?/ |
|
Last edited by bean703 on Sun Jun 03, 2007 11:05 pm; edited 4 times in total |
|
|
|
Posted: Sat May 26, 2007 8:11 pm |
|
|
bean703 |
Regular user |
|
|
Joined: Mar 21, 2007 |
Posts: 22 |
|
|
|
|
|
|
|
Has anyone tried these? Please I really need them. And even if you can't decrypt them could you please post the keyspace you tried so I don't need to do it again. |
|
|
|
|
Posted: Wed May 30, 2007 9:46 pm |
|
|
bean703 |
Regular user |
|
|
Joined: Mar 21, 2007 |
Posts: 22 |
|
|
|
|
|
|
|
okay I just finished numeric 11-12. Has anyone tried anything? |
|
|
|
|
|
Re: MD5 hashes |
|
Posted: Thu May 31, 2007 5:42 pm |
|
|
ToXiC |
Moderator |
|
|
Joined: Dec 01, 2004 |
Posts: 181 |
Location: Cyprus |
|
|
|
|
|
|
bean703 wrote: | Could someone please crack these for me I really need them:
da3b8a1cb012cd8ad47c589bda5b29ca
f6371485b4775d51beb2a836d7b18cda
7386457c34f49193c836998e71a9a377
fb86d943187e050d6e7822fed50ca028
They are unsalted hashes from a forum.
I have already tried:
all characters 1-6
upper alphanumeric 7
lower alphanumeric 7-8
numeric 9-12
Below are all of the characters that can be in a password:
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 !@#$%^&*()-_+=~`[]{}|:;<>,.?/ |
bean703 ,
as i said to previous posts its better to mention also the forum where you got this hashes..
you may found an exploit to get the md5 hash of the admin of (ex:vbulletin) forum . You also may never gain access to that site because :
1) admin used 15 chars password combined with UPPER lower Numeric Symbol Space chars
2) md5 stored in a different way , or different function
for example : $password = md5(md5($pass.$salt)) where you have here a SALTED md5 hash. OR a shadowed md5 hash which another function covers the md5 or combination of both OR combination of hashing functions ( md5 + sha1 )
rainbow tables cannot crack salted or shadowed md5s
Only dictonary / brute force / hybrid attacks ..
and this can only be used were you also know the $salt value.
So next time you post a hash and you wait for everyone else to help you , try to help them first.
I know many people on waraxe's forum will try to help you .. but if you really want help you should also be more specific.
You said a forum hash .. The first thing i though was a vbuletting or a phpbb forum .. Now both forums have salted md5s .. and you only posted the hash .. Where is the salted value. If you are able to get the hash then you can modify the code to get the salt value too !
ToXiC |
|
_________________ who|grep -i blonde|talk; cd~;wine;talk;touch;unzip;touch; strip;gasp;finger;gasp;mount; fsck; more; yes; gasp; umount; make clean; sleep;wakeup;goto http://www.md5this.com |
|
|
|
|
|
|
|
Posted: Fri Jun 01, 2007 3:18 am |
|
|
bean703 |
Regular user |
|
|
Joined: Mar 21, 2007 |
Posts: 22 |
|
|
|
|
|
|
|
actually I meant to say they are WordPress hashes. There were 8 hashes in total, but 4 of them were default passwords that I was able to decrypt. So I know that they are unsalted MD5. Also, the site is protected against using the hash so I need to actually decrypt the passwords.
One password is the admin password, one password is a password my friend made, which ttytt is probably close to a sentence, one password is probably alphanumeric symbol, and one password is just a regular password, and probably the easiest to brute force.
Please I know that it is unlikely that these can be decrypted but I really need at least one of them. Does anyone at least know where I could get a huge wordlist to try?
Thank you for all your help,
bean703 |
|
|
|
|
Posted: Fri Jun 01, 2007 8:17 pm |
|
|
pexli |
Valuable expert |
|
|
Joined: May 24, 2007 |
Posts: 665 |
Location: Bulgaria |
|
|
|
|
|
|
bean703 i try your hashes with my wordlist's(~400mb).No success. |
|
|
|
|
|
this one is difficult |
|
Posted: Mon Jun 04, 2007 12:47 am |
|
|
hackpt |
Beginner |
|
|
Joined: Jun 04, 2007 |
Posts: 1 |
|
|
|
|
|
|
|
this is my hash: 9d70e0d1e3cb9effa543f7fb28682664
anyone? |
|
|
|
|
Posted: Mon Jun 04, 2007 6:35 am |
|
|
drag |
Active user |
|
|
Joined: May 31, 2007 |
Posts: 25 |
|
|
|
|
|
|
|
Rather than continuing to post individual MD5s here... does anyone know a legitimate MD5 cracking site? I've attempted to use my own generated rainbow tables with poor results. |
|
|
|
|
Posted: Mon Jun 04, 2007 7:54 am |
|
|
bean703 |
Regular user |
|
|
Joined: Mar 21, 2007 |
Posts: 22 |
|
|
|
|
|
|
|
Quote: | Rather than continuing to post individual MD5s here... does anyone know a legitimate MD5 cracking site? I've attempted to use my own generated rainbow tables with poor results. |
http://www.und0it.com/ is a good site to try. It's down now though. |
|
|
|
|
Posted: Mon Jun 04, 2007 9:00 am |
|
|
drag |
Active user |
|
|
Joined: May 31, 2007 |
Posts: 25 |
|
|
|
|
|
|
|
Yea. That's the one I used to use until it went down (which is annoying because I lost access to everything that I had in there). Also, plain-text.info works... but not as well, and is much more limited.
I was thinking about trying to make my own, but generating the rainbow tables would take some time. |
|
|
|
|
Posted: Sat Jun 16, 2007 6:43 pm |
|
|
lynk |
Beginner |
|
|
Joined: Jun 16, 2007 |
Posts: 1 |
|
|
|
|
|
|
|
I run a site, http://www.md5oogle.com with almost 7 million hashes, and will be adding rainbow tables shortly.[/url] |
|
|
|
|
Posted: Tue Jul 24, 2007 3:16 am |
|
|
Sm0ke |
Moderator |
|
|
Joined: Nov 25, 2006 |
Posts: 141 |
Location: Finland |
|
|
|
|
|
|
kinda old but maybe you still need it..
f6371485b4775d51beb2a836d7b18cda is suckmyd1ck |
|
|
|
|
|
Re: MD5 hashes |
|
Posted: Thu Jul 14, 2011 6:56 pm |
|
|
penk |
Advanced user |
|
|
Joined: Jul 14, 2011 |
Posts: 146 |
|
|
|
|
|
|
|
ToXiC wrote: | bean703 wrote: | Could someone please crack these for me I really need them:
da3b8a1cb012cd8ad47c589bda5b29ca
f6371485b4775d51beb2a836d7b18cda
7386457c34f49193c836998e71a9a377
fb86d943187e050d6e7822fed50ca028
They are unsalted hashes from a forum.
I have already tried:
all characters 1-6
upper alphanumeric 7
lower alphanumeric 7-8
numeric 9-12
Below are all of the characters that can be in a password:
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 !@#$%^&*()-_+=~`[]{}|:;<>,.?/ |
bean703 ,
as i said to previous posts its better to mention also the forum where you got this hashes..
you may found an exploit to get the md5 hash of the admin of (ex:vbulletin) forum . You also may never gain access to that site because :
1) admin used 15 chars password combined with UPPER lower Numeric Symbol Space chars
2) md5 stored in a different way , or different function
for example : $password = md5(md5($pass.$salt)) where you have here a SALTED md5 hash. OR a shadowed md5 hash which another function covers the md5 or combination of both OR combination of hashing functions ( md5 + sha1 )
rainbow tables cannot crack salted or shadowed md5s
Only dictonary / brute force / hybrid attacks ..
and this can only be used were you also know the $salt value.
So next time you post a hash and you wait for everyone else to help you , try to help them first.
I know many people on waraxe's forum will try to help you .. but if you really want help you should also be more specific.
You said a forum hash .. The first thing i though was a vbuletting or a phpbb forum .. Now both forums have salted md5s .. and you only posted the hash .. Where is the salted value. If you are able to get the hash then you can modify the code to get the salt value too !
ToXiC |
f6371485b4775d51beb2a836d7b18cda : suckmyd1ck
penk |
|
|
|
|
|
www.waraxe.us Forum Index -> MD5 hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|