Waraxe IT Security Portal
Login or Register
November 16, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 92
Members: 0
Total: 92
Full disclosure
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other hashes -> [UPDATED]1 MD5 Hash - May Pay!! [READ] Goto page 1, 2Next
Post new topicReply to topic View previous topic :: View next topic
[UPDATED]1 MD5 Hash - May Pay!! [READ]
PostPosted: Sun Jul 05, 2009 8:26 am Reply with quote
dune
Active user
Active user
Joined: Jul 05, 2009
Posts: 26




Hi, anybody who cracks this hash for me, I may pay you, depending how much I will get out of it, I may pay over 100$ if everything goes well, but I am not guaranteeing anything, this hash may be out of date and useless. These are salted hashes from a vBulletin .sql database! Here is the hashes:

Quote:
75cbe0da905d6139abb4ec29ee37a5cd: CYH


if this one doesn't work, then please attempt the folowing:

Quote:
b5783b29a37e3047da6225d338d79e68: FP^

Quote:
e0331e85714e45653a186faa38d6e596: #SY

Quote:
9756f8b026a2459cd8192429ea090626: {IJ

Quote:
5a657aeb97cb8fca1ea9362ea156c465: 1\\|




It is most likely all lower-case letters, it may have numbers in it, most likely no symbols, most likely no spaces. Like I said, there is 75% chance that this is the hash I need, so there is no guarantee that it's actually the password that I need, but if it is, I will may pay good. If you have the rainbow tables sitting there, you don't have much to lose, but may have something to gain Smile


Last edited by dune on Wed Jul 08, 2009 2:05 am; edited 8 times in total
View user's profile Send private message
PostPosted: Mon Jul 06, 2009 2:49 am Reply with quote
dune
Active user
Active user
Joined: Jul 05, 2009
Posts: 26




If you have attempted to crack this hash but it didn't work. PLEASE reply here with the rainbow tables you used! Thanks in advance!
View user's profile Send private message
PostPosted: Mon Jul 06, 2009 8:56 am Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




I tried all rainbow tables in my possession:

numeric-1-12
loweralpha-1-9
loweralphanumeric-1-8
mixedalphanumeric-1-7
all-1-6

No success ...
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Mon Jul 06, 2009 3:56 pm Reply with quote
dune
Active user
Active user
Joined: Jul 05, 2009
Posts: 26




Thanks for trying, can you also try the new ones I put up, those may be the answer. Thanks in advance.

waraxe wrote:
I tried all rainbow tables in my possession:

numeric-1-12
loweralpha-1-9
loweralphanumeric-1-8
mixedalphanumeric-1-7
all-1-6

No success ...
View user's profile Send private message
PostPosted: Mon Jul 06, 2009 11:22 pm Reply with quote
gibbocool
Advanced user
Advanced user
Joined: Jan 22, 2008
Posts: 208




No success with BoboTig's md5-utils

_________________
http://www.gibbocool.com
View user's profile Send private message Visit poster's website
PostPosted: Tue Jul 07, 2009 1:14 am Reply with quote
dune
Active user
Active user
Joined: Jul 05, 2009
Posts: 26




gibbocool wrote:
No success with BoboTig's md5-utils


All of them failed? Interesting. I'm getting these hashes from a vBulletin .sql database.. Am I doing something wrong?
View user's profile Send private message
PostPosted: Tue Jul 07, 2009 5:05 am Reply with quote
yakavetta
Regular user
Regular user
Joined: Dec 07, 2008
Posts: 14




salted hash maybe??^^

and by the way could some explain how to work with salted hashs? only rainbowtables or is bruteforcing possible? and which tools?
View user's profile Send private message
PostPosted: Tue Jul 07, 2009 1:40 pm Reply with quote
Notfound
Advanced user
Advanced user
Joined: Mar 28, 2009
Posts: 61




dune no salt no passwords.

Next time you should see the algorithm first.

md5(md5($pass.$salt))
View user's profile Send private message
PostPosted: Tue Jul 07, 2009 8:42 pm Reply with quote
dune
Active user
Active user
Joined: Jul 05, 2009
Posts: 26




This is what I got directly out of the database about the user, where is the salt?



I edited out some stuff and replaced with what was there in []'s.

Notfound wrote:
dune no salt no passwords.

Next time you should see the algorithm first.

md5(md5($pass.$salt))


Last edited by dune on Tue Jul 07, 2009 9:24 pm; edited 1 time in total
View user's profile Send private message
PostPosted: Tue Jul 07, 2009 8:45 pm Reply with quote
Notfound
Advanced user
Advanced user
Joined: Mar 28, 2009
Posts: 61




Salt = CYH
View user's profile Send private message
PostPosted: Tue Jul 07, 2009 8:51 pm Reply with quote
dune
Active user
Active user
Joined: Jul 05, 2009
Posts: 26




AAAH, thank you man, taught me alot, maybe this should fix the problem hehe

Notfound wrote:
Salt = CYH
Smile
View user's profile Send private message
PostPosted: Wed Jul 08, 2009 12:35 am Reply with quote
earthquaker
Advanced user
Advanced user
Joined: Jun 02, 2008
Posts: 111
Location: q8




:4d104f99096dd07262a68f1e4a0f252e:BFa:bobthetomato:
:6498831289bbf13178763498b4dc1cef:dju:hydra:

i ran them fast against my dicts and found those two
ill try the others later
View user's profile Send private message
PostPosted: Wed Jul 08, 2009 2:04 am Reply with quote
dune
Active user
Active user
Joined: Jul 05, 2009
Posts: 26




earthquaker wrote:
:4d104f99096dd07262a68f1e4a0f252e:BFa:bobthetomato:
:6498831289bbf13178763498b4dc1cef:dju:hydra:

i ran them fast against my dicts and found those two
ill try the others later


Thanks! Keep them coming Very Happy
View user's profile Send private message
PostPosted: Sun Jul 12, 2009 3:26 am Reply with quote
dune
Active user
Active user
Joined: Jul 05, 2009
Posts: 26




still need these hashes cracked, cmon guys
View user's profile Send private message
PostPosted: Sun Jul 12, 2009 11:55 am Reply with quote
earthquaker
Advanced user
Advanced user
Joined: Jun 02, 2008
Posts: 111
Location: q8




try making a serious offer maybe then someone can get you those passwords Razz
View user's profile Send private message
[UPDATED]1 MD5 Hash - May Pay!! [READ]
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 2
Goto page 1, 2Next
Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.042 Seconds