|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
[UPDATED]1 MD5 Hash - May Pay!! [READ] |
|
Posted: Sun Jul 05, 2009 8:26 am |
|
|
dune |
Active user |
|
|
Joined: Jul 05, 2009 |
Posts: 26 |
|
|
|
|
|
|
|
Hi, anybody who cracks this hash for me, I may pay you, depending how much I will get out of it, I may pay over 100$ if everything goes well, but I am not guaranteeing anything, this hash may be out of date and useless. These are salted hashes from a vBulletin .sql database! Here is the hashes:
Quote: | 75cbe0da905d6139abb4ec29ee37a5cd: CYH |
if this one doesn't work, then please attempt the folowing:
Quote: | b5783b29a37e3047da6225d338d79e68: FP^ |
Quote: | e0331e85714e45653a186faa38d6e596: #SY |
Quote: | 9756f8b026a2459cd8192429ea090626: {IJ |
Quote: | 5a657aeb97cb8fca1ea9362ea156c465: 1\\| |
It is most likely all lower-case letters, it may have numbers in it, most likely no symbols, most likely no spaces. Like I said, there is 75% chance that this is the hash I need, so there is no guarantee that it's actually the password that I need, but if it is, I will may pay good. If you have the rainbow tables sitting there, you don't have much to lose, but may have something to gain |
|
Last edited by dune on Wed Jul 08, 2009 2:05 am; edited 8 times in total |
|
|
|
|
|
|
|
Posted: Mon Jul 06, 2009 2:49 am |
|
|
dune |
Active user |
|
|
Joined: Jul 05, 2009 |
Posts: 26 |
|
|
|
|
|
|
|
If you have attempted to crack this hash but it didn't work. PLEASE reply here with the rainbow tables you used! Thanks in advance! |
|
|
|
|
Posted: Mon Jul 06, 2009 8:56 am |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
I tried all rainbow tables in my possession:
numeric-1-12
loweralpha-1-9
loweralphanumeric-1-8
mixedalphanumeric-1-7
all-1-6
No success ... |
|
|
|
|
Posted: Mon Jul 06, 2009 3:56 pm |
|
|
dune |
Active user |
|
|
Joined: Jul 05, 2009 |
Posts: 26 |
|
|
|
|
|
|
|
Thanks for trying, can you also try the new ones I put up, those may be the answer. Thanks in advance.
waraxe wrote: | I tried all rainbow tables in my possession:
numeric-1-12
loweralpha-1-9
loweralphanumeric-1-8
mixedalphanumeric-1-7
all-1-6
No success ... |
|
|
|
|
|
Posted: Mon Jul 06, 2009 11:22 pm |
|
|
gibbocool |
Advanced user |
|
|
Joined: Jan 22, 2008 |
Posts: 208 |
|
|
|
|
|
|
|
No success with BoboTig's md5-utils |
|
|
|
|
Posted: Tue Jul 07, 2009 1:14 am |
|
|
dune |
Active user |
|
|
Joined: Jul 05, 2009 |
Posts: 26 |
|
|
|
|
|
|
|
gibbocool wrote: | No success with BoboTig's md5-utils |
All of them failed? Interesting. I'm getting these hashes from a vBulletin .sql database.. Am I doing something wrong? |
|
|
|
|
Posted: Tue Jul 07, 2009 5:05 am |
|
|
yakavetta |
Regular user |
|
|
Joined: Dec 07, 2008 |
Posts: 14 |
|
|
|
|
|
|
|
salted hash maybe??^^
and by the way could some explain how to work with salted hashs? only rainbowtables or is bruteforcing possible? and which tools? |
|
|
|
|
Posted: Tue Jul 07, 2009 1:40 pm |
|
|
Notfound |
Advanced user |
|
|
Joined: Mar 28, 2009 |
Posts: 61 |
|
|
|
|
|
|
|
dune no salt no passwords.
Next time you should see the algorithm first.
md5(md5($pass.$salt)) |
|
|
|
|
Posted: Tue Jul 07, 2009 8:42 pm |
|
|
dune |
Active user |
|
|
Joined: Jul 05, 2009 |
Posts: 26 |
|
|
|
|
|
|
|
This is what I got directly out of the database about the user, where is the salt?
I edited out some stuff and replaced with what was there in []'s.
Notfound wrote: | dune no salt no passwords.
Next time you should see the algorithm first.
md5(md5($pass.$salt)) |
|
|
Last edited by dune on Tue Jul 07, 2009 9:24 pm; edited 1 time in total |
|
|
|
Posted: Tue Jul 07, 2009 8:45 pm |
|
|
Notfound |
Advanced user |
|
|
Joined: Mar 28, 2009 |
Posts: 61 |
|
|
|
|
|
|
|
|
|
|
|
Posted: Tue Jul 07, 2009 8:51 pm |
|
|
dune |
Active user |
|
|
Joined: Jul 05, 2009 |
Posts: 26 |
|
|
|
|
|
|
|
AAAH, thank you man, taught me alot, maybe this should fix the problem hehe
Notfound wrote: | Salt = CYH | |
|
|
|
|
Posted: Wed Jul 08, 2009 12:35 am |
|
|
earthquaker |
Advanced user |
|
|
Joined: Jun 02, 2008 |
Posts: 111 |
Location: q8 |
|
|
|
|
|
|
:4d104f99096dd07262a68f1e4a0f252e:BFa:bobthetomato:
:6498831289bbf13178763498b4dc1cef:dju:hydra:
i ran them fast against my dicts and found those two
ill try the others later |
|
|
|
|
Posted: Wed Jul 08, 2009 2:04 am |
|
|
dune |
Active user |
|
|
Joined: Jul 05, 2009 |
Posts: 26 |
|
|
|
|
|
|
|
earthquaker wrote: | :4d104f99096dd07262a68f1e4a0f252e:BFa:bobthetomato:
:6498831289bbf13178763498b4dc1cef:dju:hydra:
i ran them fast against my dicts and found those two
ill try the others later |
Thanks! Keep them coming |
|
|
|
|
Posted: Sun Jul 12, 2009 3:26 am |
|
|
dune |
Active user |
|
|
Joined: Jul 05, 2009 |
Posts: 26 |
|
|
|
|
|
|
|
still need these hashes cracked, cmon guys |
|
|
|
|
Posted: Sun Jul 12, 2009 11:55 am |
|
|
earthquaker |
Advanced user |
|
|
Joined: Jun 02, 2008 |
Posts: 111 |
Location: q8 |
|
|
|
|
|
|
try making a serious offer maybe then someone can get you those passwords |
|
|
|
|
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 2
Goto page 1, 2Next
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|