|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Need A Hash Cracked -- Reward As Always! |
|
Posted: Sun May 25, 2008 10:20 pm |
|
|
wowhelp |
Regular user |
|
|
Joined: May 14, 2008 |
Posts: 20 |
|
|
|
|
|
|
|
converge_pass_hash: a6214086ae68fc1f1df4aba78653d729
converge_pass_salt: mxMUg
That is what I need cracked. The first person to crack it will receive dedicated access to my private server with a list of over 100 vhosts. The winner is on a first-come first-serve basis and will be announced as always!
Happy hunting!
::Keep in mind that I offer these rewards as a form of gratitude to respect those who take the time to provide other peoples needs and so forth::
When you crack it, make your post here so people are aware of the winner and also PM it to me so I get notified. Thanks in advance! |
|
|
|
|
|
|
|
|
Posted: Mon May 26, 2008 10:10 am |
|
|
lenny |
Valuable expert |
|
|
Joined: May 15, 2008 |
Posts: 275 |
|
|
|
|
|
|
|
Running it through PasswordsPro right now with my custom personal 30gb wordlist This is gonna take a looooong time
EDIT:10 minutes in, and I am 4% through the list..
EDIT: 36 minutes in - now i'm 28% through the wordlist. Thats 1586905482 passwords!
EDIT: 1hour 25 minutes into the crack. 68% of the wordlist has been completed at a rate of 543483 passwords per second giving a current total of 2819800273 password attempts. Still no result.
EDIT: 2 hours into the crack. Still no result. 88% of the wordlist has been completed. 3627813888 passwords have been attempted at an average rate of 516038 passwords per second. This is one tricky hash! If my next wordlist does not do it, I strongly doubt if anybody can do it!
EDIT: 2 hours, 16 minutes and 52 seconds after first attempt. ~4.1 billion passwords attempted to no result. This is one hell of a hash.
Let me get this straight - a converge hash is one used by IPB which is md5(md5(pass).md5(salt)) ?
Ok, I will not start my second (and final?) attempt using my small wordlist. If this dosen't work, i'll bring out the rainbow table disks!
Anyway, 13:20 (GMT) - Attempt #2. I'll let you know the results
Main Dictionary 1 (243mb): 40 seconds - 22.4 million passwords - no result
Main Dictionary 2 (1.87gb): 7minutes 12 seconds - 249.3 million passwords attempted - no result.
Other Dictionary: 23 seconds, didnt have time to see how many passwords were attempted - no result.
Overall: ~4.4 billion passwords attempted - No result - sorry mate
(PS, i will be very impressed with anybody that manages to get this!) |
|
|
|
|
|
|
|
|
Posted: Mon May 26, 2008 12:41 pm |
|
|
maku234 |
Regular user |
|
|
Joined: Jun 03, 2007 |
Posts: 21 |
Location: estonia |
|
|
|
|
|
|
lenny wrote: |
Let me get this straight - a converge hash is one used by IPB which is md5(md5(pass).md5(salt)) ?
|
IPB uses
md5(md5($salt).md5($hash)) |
|
|
|
|
Posted: Mon May 26, 2008 1:01 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
You mean md5(md5($salt).(md5($pass)) ?
And by the way this post is in wrong subforum because it's SALTED hash. |
|
|
|
|
Posted: Mon May 26, 2008 1:06 pm |
|
|
maku234 |
Regular user |
|
|
Joined: Jun 03, 2007 |
Posts: 21 |
Location: estonia |
|
|
|
|
|
|
waraxe wrote: | You mean md5(md5($salt).(md5($pass)) ?
|
yes |
|
|
|
|
Posted: Mon May 26, 2008 1:10 pm |
|
|
lenny |
Valuable expert |
|
|
Joined: May 15, 2008 |
Posts: 275 |
|
|
|
|
|
|
|
Ok, so i was doing it right then
Anybody else have anything to add? Waraxe? You are the god of rainbow tables |
|
|
|
|
Posted: Mon May 26, 2008 1:13 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
No use of rainbow tables in case of salted hashes ...
And by the way, it seems that your algorithm was still wrong (backwards?) ... |
|
|
|
|
Posted: Mon May 26, 2008 1:43 pm |
|
|
lenny |
Valuable expert |
|
|
Joined: May 15, 2008 |
Posts: 275 |
|
|
|
|
|
|
|
Great. Oh well - I am running it again, but I would like to know who else is trying and what method they are using This makes for great PC benchmarking |
|
|
|
|
Posted: Mon May 26, 2008 1:53 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
Talking about PC power - last time i checked, Passwordspro was utilizing 50% of my dual core capacity. When will Passwordspro support dual-,triple- and multicore? |
|
|
|
|
Posted: Mon May 26, 2008 2:12 pm |
|
|
lenny |
Valuable expert |
|
|
Joined: May 15, 2008 |
Posts: 275 |
|
|
|
|
|
|
|
Well I use PasswordsPro with a Intel Core 2 Quad Q6600... I hadn't noticed it only utilising 1 core So in theory, a Pentium 4 would be just as effective as a Q6600? Oh well, Ill just shift the affinity over to the last core which is hardly being used right now... |
|
|
|
|
Posted: Mon May 26, 2008 4:21 pm |
|
|
lenny |
Valuable expert |
|
|
Joined: May 15, 2008 |
Posts: 275 |
|
|
|
|
|
|
|
Ok, I have run the hash through all 4.4 billion combinations once again. No luck. |
|
|
|
|
Posted: Tue May 27, 2008 6:10 am |
|
|
wowhelp |
Regular user |
|
|
Joined: May 14, 2008 |
Posts: 20 |
|
|
|
|
|
|
|
Heh, well thanks for trying anyway people. If anyone does manage to get it, you know how to reach me.
PS.. Lenny, did you get my private message from over a week ago about the last hash? I sent it but haven't seen you active on the Network. Just want to make sure everything went well. Thanks again in advance. |
|
|
|
|
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|