Waraxe IT Security Portal
Login or Register
November 23, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 54
Members: 0
Total: 54
Full disclosure
APPLE-SA-11-19-2024-5 macOS Sequoia 15.1.1
Local Privilege Escalations in needrestart
APPLE-SA-11-19-2024-4 iOS 17.7.2 and iPadOS 17.7.2
APPLE-SA-11-19-2024-3 iOS 18.1.1 and iPadOS 18.1.1
APPLE-SA-11-19-2024-2 visionOS 2.1.1
APPLE-SA-11-19-2024-1 Safari 18.1.1
Reflected XSS - fronsetiav1.1
XXE OOB - fronsetiav1.1
St. Poelten UAS | Path Traversal in Korenix JetPort 5601
St. Poelten UAS | Multiple Stored Cross-Site Scripting in SEH utnserver Pro
Apple web content filter bypass allows unrestricted access to blocked content (macOS/iOS/iPadOS/visionO S/watchOS)
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other hashes -> need help MD5:Salt Goto page 1, 2, 3Next
Post new topicReply to topic View previous topic :: View next topic
need help MD5:Salt
PostPosted: Wed Feb 11, 2009 6:56 pm Reply with quote
ba9ba9
Active user
Active user
Joined: Feb 11, 2009
Posts: 46




someone can help me

Hash: 8be2bbc83410e88f0a789dd3d418443b
Salt: cWzih

Hash: 744e2db6a2892bde5b2fc61d686dfd22
Salt: _~wgd

Hash: 99c55e634642aa93a6a37742cb15f9b1
Salt: %wFdW

Hash: 2fb6581261dd9014d695e932bececd99
Salt: [UU+a

Hash: 05cf0fccbf6cd97be82325f3cdb6ce71
Salt: &lzp|

i try but I can't can you help me
View user's profile Send private message
PostPosted: Wed Feb 11, 2009 8:08 pm Reply with quote
capt
Advanced user
Advanced user
Joined: Nov 04, 2008
Posts: 232




what type of forum is it or algorithm is it.
View user's profile Send private message Visit poster's website MSN Messenger
PostPosted: Wed Feb 11, 2009 8:35 pm Reply with quote
ba9ba9
Active user
Active user
Joined: Feb 11, 2009
Posts: 46




capt wrote:
what type of forum is it or algorithm is it.


it is from ipb forum if you have a rapid tools de crack them help me
passpro need a long time and i can't get them
View user's profile Send private message
PostPosted: Thu Feb 12, 2009 4:39 am Reply with quote
tehhunter
Valuable expert
Valuable expert
Joined: Nov 19, 2008
Posts: 261




These are IPB hashes ( aka MD5(MD5(salt) . MD5(password)) )

got one so far:
[1] collison found: 99c55e634642aa93a6a37742cb15f9b1:%wFdW is plaintext beth23kif
View user's profile Send private message
PostPosted: Thu Feb 12, 2009 8:20 am Reply with quote
ba9ba9
Active user
Active user
Joined: Feb 11, 2009
Posts: 46




tehhunter wrote:
These are IPB hashes ( aka MD5(MD5(salt) . MD5(password)) )

got one so far:
[1] collison found: 99c55e634642aa93a6a37742cb15f9b1:%wFdW is plaintext beth23kif


juste a question i give passwordpro the hash and the salt and i choose this MD5(MD5(salt) . MD5(password)) and i write this plaintext in the first but it never dectected iit what is the problem ????
View user's profile Send private message
PostPosted: Thu Feb 12, 2009 8:21 am Reply with quote
ba9ba9
Active user
Active user
Joined: Feb 11, 2009
Posts: 46




tehhunter wrote:
These are IPB hashes ( aka MD5(MD5(salt) . MD5(password)) )

got one so far:
[1] collison found: 99c55e634642aa93a6a37742cb15f9b1:%wFdW is plaintext beth23kif


can you help me to the other or Please help me to find them by myself
View user's profile Send private message
PostPosted: Thu Feb 12, 2009 9:23 am Reply with quote
skmpz
Advanced user
Advanced user
Joined: Oct 11, 2008
Posts: 169
Location: Cyprus




download passwords pro & some good wordlists and begin Smile
View user's profile Send private message
PostPosted: Thu Feb 12, 2009 2:59 pm Reply with quote
tehhunter
Valuable expert
Valuable expert
Joined: Nov 19, 2008
Posts: 261




ba9ba9 wrote:
tehhunter wrote:
These are IPB hashes ( aka MD5(MD5(salt) . MD5(password)) )

got one so far:
[1] collison found: 99c55e634642aa93a6a37742cb15f9b1:%wFdW is plaintext beth23kif


juste a question i give passwordpro the hash and the salt and i choose this MD5(MD5(salt) . MD5(password)) and i write this plaintext in the first but it never dectected iit what is the problem ????
Did you put a/the correct salt in as well?
View user's profile Send private message
PostPosted: Thu Feb 12, 2009 3:02 pm Reply with quote
ba9ba9
Active user
Active user
Joined: Feb 11, 2009
Posts: 46




skmpz wrote:
download passwords pro & some good wordlists and begin Smile


i have a password pro and i have a good wordlists but it dont work for exemple i put the hash and the salt

99c55e634642aa93a6a37742cb15f9b1:%wFdW
and i put "beth23kif" which is founding by tehhunter in the wordliste but it said no password ... what is the problem ???

it is better than password pro or it is algorithme how i can have directely the password ???
View user's profile Send private message
PostPosted: Thu Feb 12, 2009 3:04 pm Reply with quote
ba9ba9
Active user
Active user
Joined: Feb 11, 2009
Posts: 46




tehhunter wrote:
ba9ba9 wrote:
tehhunter wrote:
These are IPB hashes ( aka MD5(MD5(salt) . MD5(password)) )

got one so far:
[1] collison found: 99c55e634642aa93a6a37742cb15f9b1:%wFdW is plaintext beth23kif


juste a question i give passwordpro the hash and the salt and i choose this MD5(MD5(salt) . MD5(password)) and i write this plaintext in the first but it never dectected iit what is the problem ????
Did you put a/the correct salt in as well?


yes i put it correctly but nothing ... i will see you by picture
View user's profile Send private message
PostPosted: Thu Feb 12, 2009 3:09 pm Reply with quote
ba9ba9
Active user
Active user
Joined: Feb 11, 2009
Posts: 46








it is right or not
View user's profile Send private message
PostPosted: Thu Feb 12, 2009 8:28 pm Reply with quote
tehhunter
Valuable expert
Valuable expert
Joined: Nov 19, 2008
Posts: 261




Assuming that that is the correct salt, yes. Try this:

1) Go to this website (http://www.adamek.biz/md5-generator.php) and type in a simple string (like 'John' without the quotes) perhaps.
2) Copy the MD5'd hash that is generated by the website (all 32 chars of it)
3) Type in another simple 5-character string (like 'salty' without the quotes).
4) Now paste the first string at the end of the string generated from #3, and generate a new combined string.

If you followed these steps, you have successfully made a IPB-style salted hash. Now enter them in passwords pro (the final string you made, and the salt (or second string as it was ('salty')). So it should be like this:

md5("john") = "527bd5b5d689e2c32ae974c6229ff785"
md5("salty") = "daf3ae813ad102e1014c6a5cb9b3a7fb"
md5("daf3ae813ad102e1014c6a5cb9b3a7fb527bd5b5d689e2c32ae974c6229ff785") = "e8d775a05ba83f2bc098a5d9fb3b1946"

So your hash would be e8d775a05ba83f2bc098a5d9fb3b1946 and your salt would be salty. In the popular format this looks like this:

e8d775a05ba83f2bc098a5d9fb3b1946:salty

Now try to run this hash/salt combination in passwords pro. To be sure, add 'john' somewhere in your wordlists (if you are using wordlists) or just do a brute force attack using only lower-case letters (not UPPER-CASE and NUMBERS).

Now that I think about it, if you are brute-forcing, that could be the problem, as the default setting in PP is bruteforcing with UPPERCASE letters and numbers (1,2,3...0), so you may want to change that in your preferences.
View user's profile Send private message
PostPosted: Thu Feb 12, 2009 9:38 pm Reply with quote
ba9ba9
Active user
Active user
Joined: Feb 11, 2009
Posts: 46




tehhunter wrote:
Assuming that that is the correct salt, yes. Try this:

1) Go to this website (http://www.adamek.biz/md5-generator.php) and type in a simple string (like 'John' without the quotes) perhaps.
2) Copy the MD5'd hash that is generated by the website (all 32 chars of it)
3) Type in another simple 5-character string (like 'salty' without the quotes).
4) Now paste the first string at the end of the string generated from #3, and generate a new combined string.

If you followed these steps, you have successfully made a IPB-style salted hash. Now enter them in passwords pro (the final string you made, and the salt (or second string as it was ('salty')). So it should be like this:

md5("john") = "527bd5b5d689e2c32ae974c6229ff785"
md5("salty") = "daf3ae813ad102e1014c6a5cb9b3a7fb"
md5("daf3ae813ad102e1014c6a5cb9b3a7fb527bd5b5d689e2c32ae974c6229ff785") = "e8d775a05ba83f2bc098a5d9fb3b1946"

So your hash would be e8d775a05ba83f2bc098a5d9fb3b1946 and your salt would be salty. In the popular format this looks like this:

e8d775a05ba83f2bc098a5d9fb3b1946:salty

Now try to run this hash/salt combination in passwords pro. To be sure, add 'john' somewhere in your wordlists (if you are using wordlists) or just do a brute force attack using only lower-case letters (not UPPER-CASE and NUMBERS).

Now that I think about it, if you are brute-forcing, that could be the problem, as the default setting in PP is bruteforcing with UPPERCASE letters and numbers (1,2,3...0), so you may want to change that in your preferences.


thank you very much for helping me but juste a question the type of cryptation is irreversible or not that mean if i know the based algorithme i can't return from the hash to password ???
and can you tel me the different forum what type of md5 they use
for exemple
These are IPB hashes ( MD5(MD5(salt) . MD5(password))
and the other ???
View user's profile Send private message
PostPosted: Thu Feb 12, 2009 9:56 pm Reply with quote
tehhunter
Valuable expert
Valuable expert
Joined: Nov 19, 2008
Posts: 261




ba9ba9 wrote:
tehhunter wrote:
Assuming that that is the correct salt, yes. Try this:

1) Go to this website (http://www.adamek.biz/md5-generator.php) and type in a simple string (like 'John' without the quotes) perhaps.
2) Copy the MD5'd hash that is generated by the website (all 32 chars of it)
3) Type in another simple 5-character string (like 'salty' without the quotes).
4) Now paste the first string at the end of the string generated from #3, and generate a new combined string.

If you followed these steps, you have successfully made a IPB-style salted hash. Now enter them in passwords pro (the final string you made, and the salt (or second string as it was ('salty')). So it should be like this:

md5("john") = "527bd5b5d689e2c32ae974c6229ff785"
md5("salty") = "daf3ae813ad102e1014c6a5cb9b3a7fb"
md5("daf3ae813ad102e1014c6a5cb9b3a7fb527bd5b5d689e2c32ae974c6229ff785") = "e8d775a05ba83f2bc098a5d9fb3b1946"

So your hash would be e8d775a05ba83f2bc098a5d9fb3b1946 and your salt would be salty. In the popular format this looks like this:

e8d775a05ba83f2bc098a5d9fb3b1946:salty

Now try to run this hash/salt combination in passwords pro. To be sure, add 'john' somewhere in your wordlists (if you are using wordlists) or just do a brute force attack using only lower-case letters (not UPPER-CASE and NUMBERS).

Now that I think about it, if you are brute-forcing, that could be the problem, as the default setting in PP is bruteforcing with UPPERCASE letters and numbers (1,2,3...0), so you may want to change that in your preferences.


thank you very much for helping me but juste a question the type of cryptation is irreversible or not that mean if i know the based algorithme i can't return from the hash to password ???
and can you tel me the different forum what type of md5 they use
for exemple
These are IPB hashes ( MD5(MD5(salt) . MD5(password))
and the other ???
To answer your question, I have a question of my own.

Is 4 = 1+3 or is 4 = 2+2, or maybe even 3.72 + 0.28?

The answer is both are correct. MD5 is a one-way algorithm, and thus it cannot be reversed. The only thing possible, as we do here, is to try hashing many other words in the hope that they will be the same as the hash we are trying to crack. Unfortunately, its not easy or guaranteed.
View user's profile Send private message
PostPosted: Thu Feb 12, 2009 10:08 pm Reply with quote
ba9ba9
Active user
Active user
Joined: Feb 11, 2009
Posts: 46




tehhunter wrote:
ba9ba9 wrote:
tehhunter wrote:
Assuming that that is the correct salt, yes. Try this:

1) Go to this website (http://www.adamek.biz/md5-generator.php) and type in a simple string (like 'John' without the quotes) perhaps.
2) Copy the MD5'd hash that is generated by the website (all 32 chars of it)
3) Type in another simple 5-character string (like 'salty' without the quotes).
4) Now paste the first string at the end of the string generated from #3, and generate a new combined string.

If you followed these steps, you have successfully made a IPB-style salted hash. Now enter them in passwords pro (the final string you made, and the salt (or second string as it was ('salty')). So it should be like this:

md5("john") = "527bd5b5d689e2c32ae974c6229ff785"
md5("salty") = "daf3ae813ad102e1014c6a5cb9b3a7fb"
md5("daf3ae813ad102e1014c6a5cb9b3a7fb527bd5b5d689e2c32ae974c6229ff785") = "e8d775a05ba83f2bc098a5d9fb3b1946"

So your hash would be e8d775a05ba83f2bc098a5d9fb3b1946 and your salt would be salty. In the popular format this looks like this:

e8d775a05ba83f2bc098a5d9fb3b1946:salty

Now try to run this hash/salt combination in passwords pro. To be sure, add 'john' somewhere in your wordlists (if you are using wordlists) or just do a brute force attack using only lower-case letters (not UPPER-CASE and NUMBERS).

Now that I think about it, if you are brute-forcing, that could be the problem, as the default setting in PP is bruteforcing with UPPERCASE letters and numbers (1,2,3...0), so you may want to change that in your preferences.


thank you very much for helping me but juste a question the type of cryptation is irreversible or not that mean if i know the based algorithme i can't return from the hash to password ???
and can you tel me the different forum what type of md5 they use
for exemple
These are IPB hashes ( MD5(MD5(salt) . MD5(password))
and the other ???
To answer your question, I have a question of my own.

Is 4 = 1+3 or is 4 = 2+2, or maybe even 3.72 + 0.28?

The answer is both are correct. MD5 is a one-way algorithm, and thus it cannot be reversed. The only thing possible, as we do here, is to try hashing many other words in the hope that they will be the same as the hash we are trying to crack. Unfortunately, its not easy or guaranteed.


thank you very much for your reponse...
so i use passwordpro and i wait it give me the password but it take a long time (my PC have a 750 Mo de RAM et geforce 5200 )
what is the best rerference of a computer to make it fastly ??? and can't I make this job by a reseau of computer (5 or 6 PC work to gether to have the password by using passwordpro )) it is possible
View user's profile Send private message
need help MD5:Salt
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 3
Goto page 1, 2, 3Next
Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.047 Seconds