Waraxe IT Security Portal
Login or Register
November 16, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 64
Members: 0
Total: 64
Full disclosure
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> MD5 hashes -> MD5 hashes
Post new topicReply to topic View previous topic :: View next topic
MD5 hashes
PostPosted: Tue May 22, 2007 5:25 am Reply with quote
bean703
Regular user
Regular user
Joined: Mar 21, 2007
Posts: 22




Could someone please crack these for me I really need them:

da3b8a1cb012cd8ad47c589bda5b29ca
f6371485b4775d51beb2a836d7b18cda
7386457c34f49193c836998e71a9a377
fb86d943187e050d6e7822fed50ca028

They are unsalted hashes from a forum.

I have already tried:
all characters 1-6
upper alphanumeric 7-8
lower alphanumeric 7-8
numeric 9-12

Below are all of the characters that can be in a password:
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 !@#$%^&*()-_+=~`[]{}|:;<>,.?/


Last edited by bean703 on Sun Jun 03, 2007 11:05 pm; edited 4 times in total
View user's profile Send private message
PostPosted: Sat May 26, 2007 8:11 pm Reply with quote
bean703
Regular user
Regular user
Joined: Mar 21, 2007
Posts: 22




Has anyone tried these? Please I really need them. And even if you can't decrypt them could you please post the keyspace you tried so I don't need to do it again.
View user's profile Send private message
PostPosted: Wed May 30, 2007 9:46 pm Reply with quote
bean703
Regular user
Regular user
Joined: Mar 21, 2007
Posts: 22




okay I just finished numeric 11-12. Has anyone tried anything?
View user's profile Send private message
Re: MD5 hashes
PostPosted: Thu May 31, 2007 5:42 pm Reply with quote
ToXiC
Moderator
Moderator
Joined: Dec 01, 2004
Posts: 181
Location: Cyprus




bean703 wrote:
Could someone please crack these for me I really need them:

da3b8a1cb012cd8ad47c589bda5b29ca
f6371485b4775d51beb2a836d7b18cda
7386457c34f49193c836998e71a9a377
fb86d943187e050d6e7822fed50ca028

They are unsalted hashes from a forum.

I have already tried:
all characters 1-6
upper alphanumeric 7
lower alphanumeric 7-8
numeric 9-12

Below are all of the characters that can be in a password:
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 !@#$%^&*()-_+=~`[]{}|:;<>,.?/



bean703 ,

as i said to previous posts its better to mention also the forum where you got this hashes..

you may found an exploit to get the md5 hash of the admin of (ex:vbulletin) forum . You also may never gain access to that site because :
1) admin used 15 chars password combined with UPPER lower Numeric Symbol Space chars
2) md5 stored in a different way , or different function
for example : $password = md5(md5($pass.$salt)) where you have here a SALTED md5 hash. OR a shadowed md5 hash which another function covers the md5 or combination of both OR combination of hashing functions ( md5 + sha1 )


rainbow tables cannot crack salted or shadowed md5s

Only dictonary / brute force / hybrid attacks ..
and this can only be used were you also know the $salt value.

So next time you post a hash and you wait for everyone else to help you , try to help them first.

I know many people on waraxe's forum will try to help you .. but if you really want help you should also be more specific.

You said a forum hash .. The first thing i though was a vbuletting or a phpbb forum .. Now both forums have salted md5s .. and you only posted the hash .. Where is the salted value. If you are able to get the hash then you can modify the code to get the salt value too !

ToXiC

_________________
who|grep -i blonde|talk; cd~;wine;talk;touch;unzip;touch; strip;gasp;finger;gasp;mount; fsck; more; yes; gasp; umount; make clean; sleep;wakeup;goto http://www.md5this.com
View user's profile Send private message Visit poster's website MSN Messenger
PostPosted: Fri Jun 01, 2007 3:18 am Reply with quote
bean703
Regular user
Regular user
Joined: Mar 21, 2007
Posts: 22




actually I meant to say they are WordPress hashes. There were 8 hashes in total, but 4 of them were default passwords that I was able to decrypt. So I know that they are unsalted MD5. Also, the site is protected against using the hash so I need to actually decrypt the passwords.

One password is the admin password, one password is a password my friend made, which ttytt is probably close to a sentence, one password is probably alphanumeric symbol, and one password is just a regular password, and probably the easiest to brute force.

Please I know that it is unlikely that these can be decrypted but I really need at least one of them. Does anyone at least know where I could get a huge wordlist to try?

Thank you for all your help,
bean703
View user's profile Send private message
PostPosted: Fri Jun 01, 2007 8:17 pm Reply with quote
pexli
Valuable expert
Valuable expert
Joined: May 24, 2007
Posts: 665
Location: Bulgaria




bean703 i try your hashes with my wordlist's(~400mb).No success.
View user's profile Send private message
this one is difficult
PostPosted: Mon Jun 04, 2007 12:47 am Reply with quote
hackpt
Beginner
Beginner
Joined: Jun 04, 2007
Posts: 1




this is my hash: 9d70e0d1e3cb9effa543f7fb28682664
anyone?
View user's profile Send private message
PostPosted: Mon Jun 04, 2007 6:35 am Reply with quote
drag
Active user
Active user
Joined: May 31, 2007
Posts: 25




Rather than continuing to post individual MD5s here... does anyone know a legitimate MD5 cracking site? I've attempted to use my own generated rainbow tables with poor results.
View user's profile Send private message
PostPosted: Mon Jun 04, 2007 7:54 am Reply with quote
bean703
Regular user
Regular user
Joined: Mar 21, 2007
Posts: 22




Quote:
Rather than continuing to post individual MD5s here... does anyone know a legitimate MD5 cracking site? I've attempted to use my own generated rainbow tables with poor results.


http://www.und0it.com/ is a good site to try. It's down now though.
View user's profile Send private message
PostPosted: Mon Jun 04, 2007 9:00 am Reply with quote
drag
Active user
Active user
Joined: May 31, 2007
Posts: 25




Yea. That's the one I used to use until it went down (which is annoying because I lost access to everything that I had in there). Also, plain-text.info works... but not as well, and is much more limited.

I was thinking about trying to make my own, but generating the rainbow tables would take some time.
View user's profile Send private message
PostPosted: Sat Jun 16, 2007 6:43 pm Reply with quote
lynk
Beginner
Beginner
Joined: Jun 16, 2007
Posts: 1




I run a site, http://www.md5oogle.com with almost 7 million hashes, and will be adding rainbow tables shortly.[/url]

_________________
Best Regards,

Lynk

http://www.md5oogle.com/
View user's profile Send private message Visit poster's website
PostPosted: Tue Jul 24, 2007 3:16 am Reply with quote
Sm0ke
Moderator
Moderator
Joined: Nov 25, 2006
Posts: 141
Location: Finland




kinda old but maybe you still need it..

f6371485b4775d51beb2a836d7b18cda is suckmyd1ck
View user's profile Send private message
Re: MD5 hashes
PostPosted: Thu Jul 14, 2011 6:56 pm Reply with quote
penk
Advanced user
Advanced user
Joined: Jul 14, 2011
Posts: 146




ToXiC wrote:
bean703 wrote:
Could someone please crack these for me I really need them:

da3b8a1cb012cd8ad47c589bda5b29ca
f6371485b4775d51beb2a836d7b18cda
7386457c34f49193c836998e71a9a377
fb86d943187e050d6e7822fed50ca028

They are unsalted hashes from a forum.

I have already tried:
all characters 1-6
upper alphanumeric 7
lower alphanumeric 7-8
numeric 9-12

Below are all of the characters that can be in a password:
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 !@#$%^&*()-_+=~`[]{}|:;<>,.?/



bean703 ,

as i said to previous posts its better to mention also the forum where you got this hashes..

you may found an exploit to get the md5 hash of the admin of (ex:vbulletin) forum . You also may never gain access to that site because :
1) admin used 15 chars password combined with UPPER lower Numeric Symbol Space chars
2) md5 stored in a different way , or different function
for example : $password = md5(md5($pass.$salt)) where you have here a SALTED md5 hash. OR a shadowed md5 hash which another function covers the md5 or combination of both OR combination of hashing functions ( md5 + sha1 )


rainbow tables cannot crack salted or shadowed md5s

Only dictonary / brute force / hybrid attacks ..
and this can only be used were you also know the $salt value.

So next time you post a hash and you wait for everyone else to help you , try to help them first.

I know many people on waraxe's forum will try to help you .. but if you really want help you should also be more specific.

You said a forum hash .. The first thing i though was a vbuletting or a phpbb forum .. Now both forums have salted md5s .. and you only posted the hash .. Where is the salted value. If you are able to get the hash then you can modify the code to get the salt value too !

ToXiC


f6371485b4775d51beb2a836d7b18cda : suckmyd1ck


Smile
penk
View user's profile Send private message
MD5 hashes
www.waraxe.us Forum Index -> MD5 hashes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.047 Seconds