|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 51
Members: 0
Total: 51
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
need help MD5:Salt |
|
Posted: Wed Feb 11, 2009 6:56 pm |
|
|
ba9ba9 |
Active user |
|
|
Joined: Feb 11, 2009 |
Posts: 46 |
|
|
|
|
|
|
|
someone can help me
Hash: 8be2bbc83410e88f0a789dd3d418443b
Salt: cWzih
Hash: 744e2db6a2892bde5b2fc61d686dfd22
Salt: _~wgd
Hash: 99c55e634642aa93a6a37742cb15f9b1
Salt: %wFdW
Hash: 2fb6581261dd9014d695e932bececd99
Salt: [UU+a
Hash: 05cf0fccbf6cd97be82325f3cdb6ce71
Salt: &lzp|
i try but I can't can you help me |
|
|
|
|
Posted: Wed Feb 11, 2009 8:08 pm |
|
|
capt |
Advanced user |
|
|
Joined: Nov 04, 2008 |
Posts: 232 |
|
|
|
|
|
|
|
what type of forum is it or algorithm is it. |
|
|
|
|
Posted: Wed Feb 11, 2009 8:35 pm |
|
|
ba9ba9 |
Active user |
|
|
Joined: Feb 11, 2009 |
Posts: 46 |
|
|
|
|
|
|
|
capt wrote: | what type of forum is it or algorithm is it. |
it is from ipb forum if you have a rapid tools de crack them help me
passpro need a long time and i can't get them |
|
|
|
|
Posted: Thu Feb 12, 2009 4:39 am |
|
|
tehhunter |
Valuable expert |
|
|
Joined: Nov 19, 2008 |
Posts: 261 |
|
|
|
|
|
|
|
These are IPB hashes ( aka MD5(MD5(salt) . MD5(password)) )
got one so far:
[1] collison found: 99c55e634642aa93a6a37742cb15f9b1:%wFdW is plaintext beth23kif |
|
|
|
|
Posted: Thu Feb 12, 2009 8:20 am |
|
|
ba9ba9 |
Active user |
|
|
Joined: Feb 11, 2009 |
Posts: 46 |
|
|
|
|
|
|
|
tehhunter wrote: | These are IPB hashes ( aka MD5(MD5(salt) . MD5(password)) )
got one so far:
[1] collison found: 99c55e634642aa93a6a37742cb15f9b1:%wFdW is plaintext beth23kif |
juste a question i give passwordpro the hash and the salt and i choose this MD5(MD5(salt) . MD5(password)) and i write this plaintext in the first but it never dectected iit what is the problem ???? |
|
|
|
|
Posted: Thu Feb 12, 2009 8:21 am |
|
|
ba9ba9 |
Active user |
|
|
Joined: Feb 11, 2009 |
Posts: 46 |
|
|
|
|
|
|
|
tehhunter wrote: | These are IPB hashes ( aka MD5(MD5(salt) . MD5(password)) )
got one so far:
[1] collison found: 99c55e634642aa93a6a37742cb15f9b1:%wFdW is plaintext beth23kif |
can you help me to the other or Please help me to find them by myself |
|
|
|
|
Posted: Thu Feb 12, 2009 9:23 am |
|
|
skmpz |
Advanced user |
|
|
Joined: Oct 11, 2008 |
Posts: 169 |
Location: Cyprus |
|
|
|
|
|
|
download passwords pro & some good wordlists and begin |
|
|
|
|
Posted: Thu Feb 12, 2009 2:59 pm |
|
|
tehhunter |
Valuable expert |
|
|
Joined: Nov 19, 2008 |
Posts: 261 |
|
|
|
|
|
|
|
ba9ba9 wrote: | tehhunter wrote: | These are IPB hashes ( aka MD5(MD5(salt) . MD5(password)) )
got one so far:
[1] collison found: 99c55e634642aa93a6a37742cb15f9b1:%wFdW is plaintext beth23kif |
juste a question i give passwordpro the hash and the salt and i choose this MD5(MD5(salt) . MD5(password)) and i write this plaintext in the first but it never dectected iit what is the problem ???? | Did you put a/the correct salt in as well? |
|
|
|
|
|
|
|
|
Posted: Thu Feb 12, 2009 3:02 pm |
|
|
ba9ba9 |
Active user |
|
|
Joined: Feb 11, 2009 |
Posts: 46 |
|
|
|
|
|
|
|
skmpz wrote: | download passwords pro & some good wordlists and begin |
i have a password pro and i have a good wordlists but it dont work for exemple i put the hash and the salt
99c55e634642aa93a6a37742cb15f9b1:%wFdW
and i put "beth23kif" which is founding by tehhunter in the wordliste but it said no password ... what is the problem ???
it is better than password pro or it is algorithme how i can have directely the password ??? |
|
|
|
|
|
|
|
|
Posted: Thu Feb 12, 2009 3:04 pm |
|
|
ba9ba9 |
Active user |
|
|
Joined: Feb 11, 2009 |
Posts: 46 |
|
|
|
|
|
|
|
tehhunter wrote: | ba9ba9 wrote: | tehhunter wrote: | These are IPB hashes ( aka MD5(MD5(salt) . MD5(password)) )
got one so far:
[1] collison found: 99c55e634642aa93a6a37742cb15f9b1:%wFdW is plaintext beth23kif |
juste a question i give passwordpro the hash and the salt and i choose this MD5(MD5(salt) . MD5(password)) and i write this plaintext in the first but it never dectected iit what is the problem ???? | Did you put a/the correct salt in as well? |
yes i put it correctly but nothing ... i will see you by picture |
|
|
|
|
Posted: Thu Feb 12, 2009 3:09 pm |
|
|
ba9ba9 |
Active user |
|
|
Joined: Feb 11, 2009 |
Posts: 46 |
|
|
|
|
|
|
|
it is right or not |
|
|
|
|
|
|
|
|
Posted: Thu Feb 12, 2009 8:28 pm |
|
|
tehhunter |
Valuable expert |
|
|
Joined: Nov 19, 2008 |
Posts: 261 |
|
|
|
|
|
|
|
Assuming that that is the correct salt, yes. Try this:
1) Go to this website (http://www.adamek.biz/md5-generator.php) and type in a simple string (like 'John' without the quotes) perhaps.
2) Copy the MD5'd hash that is generated by the website (all 32 chars of it)
3) Type in another simple 5-character string (like 'salty' without the quotes).
4) Now paste the first string at the end of the string generated from #3, and generate a new combined string.
If you followed these steps, you have successfully made a IPB-style salted hash. Now enter them in passwords pro (the final string you made, and the salt (or second string as it was ('salty')). So it should be like this:
md5("john") = "527bd5b5d689e2c32ae974c6229ff785"
md5("salty") = "daf3ae813ad102e1014c6a5cb9b3a7fb"
md5("daf3ae813ad102e1014c6a5cb9b3a7fb527bd5b5d689e2c32ae974c6229ff785") = "e8d775a05ba83f2bc098a5d9fb3b1946"
So your hash would be e8d775a05ba83f2bc098a5d9fb3b1946 and your salt would be salty. In the popular format this looks like this:
e8d775a05ba83f2bc098a5d9fb3b1946:salty
Now try to run this hash/salt combination in passwords pro. To be sure, add 'john' somewhere in your wordlists (if you are using wordlists) or just do a brute force attack using only lower-case letters (not UPPER-CASE and NUMBERS).
Now that I think about it, if you are brute-forcing, that could be the problem, as the default setting in PP is bruteforcing with UPPERCASE letters and numbers (1,2,3...0), so you may want to change that in your preferences. |
|
|
|
|
|
|
|
|
Posted: Thu Feb 12, 2009 9:38 pm |
|
|
ba9ba9 |
Active user |
|
|
Joined: Feb 11, 2009 |
Posts: 46 |
|
|
|
|
|
|
|
tehhunter wrote: | Assuming that that is the correct salt, yes. Try this:
1) Go to this website (http://www.adamek.biz/md5-generator.php) and type in a simple string (like 'John' without the quotes) perhaps.
2) Copy the MD5'd hash that is generated by the website (all 32 chars of it)
3) Type in another simple 5-character string (like 'salty' without the quotes).
4) Now paste the first string at the end of the string generated from #3, and generate a new combined string.
If you followed these steps, you have successfully made a IPB-style salted hash. Now enter them in passwords pro (the final string you made, and the salt (or second string as it was ('salty')). So it should be like this:
md5("john") = "527bd5b5d689e2c32ae974c6229ff785"
md5("salty") = "daf3ae813ad102e1014c6a5cb9b3a7fb"
md5("daf3ae813ad102e1014c6a5cb9b3a7fb527bd5b5d689e2c32ae974c6229ff785") = "e8d775a05ba83f2bc098a5d9fb3b1946"
So your hash would be e8d775a05ba83f2bc098a5d9fb3b1946 and your salt would be salty. In the popular format this looks like this:
e8d775a05ba83f2bc098a5d9fb3b1946:salty
Now try to run this hash/salt combination in passwords pro. To be sure, add 'john' somewhere in your wordlists (if you are using wordlists) or just do a brute force attack using only lower-case letters (not UPPER-CASE and NUMBERS).
Now that I think about it, if you are brute-forcing, that could be the problem, as the default setting in PP is bruteforcing with UPPERCASE letters and numbers (1,2,3...0), so you may want to change that in your preferences. |
thank you very much for helping me but juste a question the type of cryptation is irreversible or not that mean if i know the based algorithme i can't return from the hash to password ???
and can you tel me the different forum what type of md5 they use
for exemple
These are IPB hashes ( MD5(MD5(salt) . MD5(password))
and the other ??? |
|
|
|
|
|
|
|
|
Posted: Thu Feb 12, 2009 9:56 pm |
|
|
tehhunter |
Valuable expert |
|
|
Joined: Nov 19, 2008 |
Posts: 261 |
|
|
|
|
|
|
|
ba9ba9 wrote: | tehhunter wrote: | Assuming that that is the correct salt, yes. Try this:
1) Go to this website (http://www.adamek.biz/md5-generator.php) and type in a simple string (like 'John' without the quotes) perhaps.
2) Copy the MD5'd hash that is generated by the website (all 32 chars of it)
3) Type in another simple 5-character string (like 'salty' without the quotes).
4) Now paste the first string at the end of the string generated from #3, and generate a new combined string.
If you followed these steps, you have successfully made a IPB-style salted hash. Now enter them in passwords pro (the final string you made, and the salt (or second string as it was ('salty')). So it should be like this:
md5("john") = "527bd5b5d689e2c32ae974c6229ff785"
md5("salty") = "daf3ae813ad102e1014c6a5cb9b3a7fb"
md5("daf3ae813ad102e1014c6a5cb9b3a7fb527bd5b5d689e2c32ae974c6229ff785") = "e8d775a05ba83f2bc098a5d9fb3b1946"
So your hash would be e8d775a05ba83f2bc098a5d9fb3b1946 and your salt would be salty. In the popular format this looks like this:
e8d775a05ba83f2bc098a5d9fb3b1946:salty
Now try to run this hash/salt combination in passwords pro. To be sure, add 'john' somewhere in your wordlists (if you are using wordlists) or just do a brute force attack using only lower-case letters (not UPPER-CASE and NUMBERS).
Now that I think about it, if you are brute-forcing, that could be the problem, as the default setting in PP is bruteforcing with UPPERCASE letters and numbers (1,2,3...0), so you may want to change that in your preferences. |
thank you very much for helping me but juste a question the type of cryptation is irreversible or not that mean if i know the based algorithme i can't return from the hash to password ???
and can you tel me the different forum what type of md5 they use
for exemple
These are IPB hashes ( MD5(MD5(salt) . MD5(password))
and the other ??? | To answer your question, I have a question of my own.
Is 4 = 1+3 or is 4 = 2+2, or maybe even 3.72 + 0.28?
The answer is both are correct. MD5 is a one-way algorithm, and thus it cannot be reversed. The only thing possible, as we do here, is to try hashing many other words in the hope that they will be the same as the hash we are trying to crack. Unfortunately, its not easy or guaranteed. |
|
|
|
|
|
|
|
|
Posted: Thu Feb 12, 2009 10:08 pm |
|
|
ba9ba9 |
Active user |
|
|
Joined: Feb 11, 2009 |
Posts: 46 |
|
|
|
|
|
|
|
tehhunter wrote: | ba9ba9 wrote: | tehhunter wrote: | Assuming that that is the correct salt, yes. Try this:
1) Go to this website (http://www.adamek.biz/md5-generator.php) and type in a simple string (like 'John' without the quotes) perhaps.
2) Copy the MD5'd hash that is generated by the website (all 32 chars of it)
3) Type in another simple 5-character string (like 'salty' without the quotes).
4) Now paste the first string at the end of the string generated from #3, and generate a new combined string.
If you followed these steps, you have successfully made a IPB-style salted hash. Now enter them in passwords pro (the final string you made, and the salt (or second string as it was ('salty')). So it should be like this:
md5("john") = "527bd5b5d689e2c32ae974c6229ff785"
md5("salty") = "daf3ae813ad102e1014c6a5cb9b3a7fb"
md5("daf3ae813ad102e1014c6a5cb9b3a7fb527bd5b5d689e2c32ae974c6229ff785") = "e8d775a05ba83f2bc098a5d9fb3b1946"
So your hash would be e8d775a05ba83f2bc098a5d9fb3b1946 and your salt would be salty. In the popular format this looks like this:
e8d775a05ba83f2bc098a5d9fb3b1946:salty
Now try to run this hash/salt combination in passwords pro. To be sure, add 'john' somewhere in your wordlists (if you are using wordlists) or just do a brute force attack using only lower-case letters (not UPPER-CASE and NUMBERS).
Now that I think about it, if you are brute-forcing, that could be the problem, as the default setting in PP is bruteforcing with UPPERCASE letters and numbers (1,2,3...0), so you may want to change that in your preferences. |
thank you very much for helping me but juste a question the type of cryptation is irreversible or not that mean if i know the based algorithme i can't return from the hash to password ???
and can you tel me the different forum what type of md5 they use
for exemple
These are IPB hashes ( MD5(MD5(salt) . MD5(password))
and the other ??? | To answer your question, I have a question of my own.
Is 4 = 1+3 or is 4 = 2+2, or maybe even 3.72 + 0.28?
The answer is both are correct. MD5 is a one-way algorithm, and thus it cannot be reversed. The only thing possible, as we do here, is to try hashing many other words in the hope that they will be the same as the hash we are trying to crack. Unfortunately, its not easy or guaranteed. |
thank you very much for your reponse...
so i use passwordpro and i wait it give me the password but it take a long time (my PC have a 750 Mo de RAM et geforce 5200 )
what is the best rerference of a computer to make it fastly ??? and can't I make this job by a reseau of computer (5 or 6 PC work to gether to have the password by using passwordpro )) it is possible |
|
|
|
|
|
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 3
Goto page 1, 2, 3Next
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|