|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 55
Members: 0
Total: 55
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
IPB 2.3.5 Hash Help? |
|
Posted: Sat Nov 15, 2008 6:13 pm |
|
|
renaker |
Active user |
|
|
Joined: Nov 15, 2008 |
Posts: 27 |
|
|
|
|
|
|
|
Hash: d7b22e1b6a5e2d8ebd02900647596433
Salt: h[Gc>
or
Hash: f8a61450f592777c189d25e54ee70742
Salt: nlR1T
or this one, which would be the best, but is probably the hardest to attack
Hash: ce092fe7d7361e52a0a2a8afa27116e0
Salt: ?1~%$
I know I'm brand new, but would anybody be up to helping retrieve the password associated with this hash and salt? It's to an IPB 2.3.5 board. I would go far enough to call you my mortal Jesus for any help regarding this issue. I hopefully only need one of those passes.<3 |
|
|
|
|
Posted: Sat Nov 15, 2008 8:58 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
Plaintext of ce092fe7d7361e52a0a2a8afa27116e0 is password
|
|
|
|
|
Posted: Sat Nov 15, 2008 11:03 pm |
|
|
renaker |
Active user |
|
|
Joined: Nov 15, 2008 |
Posts: 27 |
|
|
|
|
|
|
|
Wow, you ARE my mortal Jesus. Out of curiosity, why kind of system are you using? Anything to do with elcomsoft? I'm a newb when it comes to hash's. |
|
|
|
|
Posted: Sat Nov 15, 2008 11:14 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Posted: Sun Nov 16, 2008 4:56 am |
|
|
renaker |
Active user |
|
|
Joined: Nov 15, 2008 |
Posts: 27 |
|
|
|
|
|
|
|
I tried googling it, but I failed. Would you mind posting the hash format that ipb 2.3.5 uses? like: MD5($salt.$pass.$salt); or whatever it happens to be. I'm trying to learn how to use the tools you showed me. I wish I had the graphics card to go with it, lol. I'd much rather learn to do this on my own instead of begging for help every time I need a hash cracked. Thanks in advance if you decide to post. Btw, this site rocks. It's not normal policy for a newbie to join and get that level of help. I really appreciate it.
EDIT:
I found this on the site, but is this true for 2.3.5?
"Just let me know what you think, and I might implement an md5 bruteforcer that supports IPB md5(md5(salt).md5(pwd)) hashing algorithm and uses this method to bruteforce your hashes..." |
|
|
|
|
|
|
|
|
Posted: Sun Nov 16, 2008 4:17 pm |
|
|
Pinox |
Regular user |
|
|
Joined: Dec 22, 2005 |
Posts: 13 |
|
|
|
|
|
|
|
Yeah that's right just download passwordspro find a good wordlist and use this setting to try and crack the hash:
Code: | md5(md5($salt).md5($pass)) |
|
|
|
|
|
Posted: Mon Nov 17, 2008 6:07 pm |
|
|
renaker |
Active user |
|
|
Joined: Nov 15, 2008 |
Posts: 27 |
|
|
|
|
|
|
|
Pinox wrote: | Yeah that's right just download passwordspro find a good wordlist and use this setting to try and crack the hash:
Code: | md5(md5($salt).md5($pass)) |
|
Thanks man, also, would you happen to know where to find a decent wordlist? I downloaded every wordlist at:
http://www.insidepro.com/eng/download.shtml
but so far I've only had like 30% success rate, and it's only finding really simple passes. Would you happen to know where to find a really good list? |
|
|
|
|
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|