|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
MyBB forum md5 hash |
|
Posted: Sat Jan 05, 2008 7:40 pm |
|
|
Dolorious |
Regular user |
|
|
Joined: Jan 05, 2008 |
Posts: 5 |
|
|
|
|
|
|
|
Hello.
I was looking around and it seems waraxe is quite good at cracking MD5 hashes.
Question:
I have this MyBB MD5 hash, and I'm not certain what the algorithm is for mybb forums.
These are two MD5's.
[+] MD5-Hash: 7ec43d090f6f09e9322774495d40b9d3
[+] MD5-Hash: 7ebca3ee49ee1c6ee775b6b4a065ec72
Thanks!
MyBB is using salted hashes? Then where are salts? |
|
|
|
|
|
|
|
|
Posted: Sat Jan 05, 2008 10:04 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
From mybb 1.2.10 installer:
Code: |
$tables[] = "CREATE TABLE mybb_users (
uid int unsigned NOT NULL auto_increment,
username varchar(120) NOT NULL default '',
password varchar(120) NOT NULL default '',
salt varchar(10) NOT NULL default '',
loginkey varchar(50) NOT NULL default '',
email varchar(220) NOT NULL default '',
postnum int(10) NOT NULL default '0',
avatar varchar(200) NOT NULL default '',
avatardimensions varchar(10) NOT NULL default '',
avatartype varchar(10) NOT NULL default '0',
usergroup smallint unsigned NOT NULL default '0',
additionalgroups varchar(200) NOT NULL default '',
displaygroup smallint unsigned NOT NULL default '0',
usertitle varchar(250) NOT NULL default '',
regdate bigint(30) NOT NULL default '0',
lastactive bigint(30) NOT NULL default '0',
lastvisit bigint(30) NOT NULL default '0',
lastpost bigint(30) NOT NULL default '0',
website varchar(200) NOT NULL default '',
icq varchar(10) NOT NULL default '',
aim varchar(50) NOT NULL default '',
yahoo varchar(50) NOT NULL default '',
msn varchar(75) NOT NULL default '',
birthday varchar(15) NOT NULL default '',
signature text NOT NULL,
allownotices char(3) NOT NULL default '',
hideemail char(3) NOT NULL default '',
emailnotify char(3) NOT NULL default '',
invisible char(3) NOT NULL default '',
receivepms char(3) NOT NULL default '',
pmpopup char(3) NOT NULL default '',
pmnotify char(3) NOT NULL default '',
remember char(3) NOT NULL default '',
threadmode varchar(8) NOT NULL default '',
showsigs char(3) NOT NULL default '',
showavatars char(3) NOT NULL default '',
showquickreply char(3) NOT NULL default '',
showredirect char(3) NOT NULL default '',
ppp smallint(6) NOT NULL default '0',
tpp smallint(6) NOT NULL default '0',
daysprune smallint(6) NOT NULL default '0',
dateformat varchar(4) NOT NULL default '',
timeformat varchar(4) NOT NULL default '',
timezone varchar(4) NOT NULL default '',
dst varchar(4) NOT NULL default '',
buddylist text NOT NULL,
ignorelist text NOT NULL,
style smallint unsigned NOT NULL default '0',
away char(3) NOT NULL default '',
awaydate int(10) unsigned NOT NULL default '0',
returndate varchar(15) NOT NULL default '',
awayreason varchar(200) NOT NULL default '',
pmfolders text NOT NULL,
notepad text NOT NULL,
referrer int unsigned NOT NULL default '0',
reputation bigint(30) NOT NULL default '0',
regip varchar(50) NOT NULL default '',
language varchar(50) NOT NULL default '',
timeonline bigint(30) NOT NULL default '0',
showcodebuttons int(1) NOT NULL default '1',
totalpms int(10) NOT NULL default '0',
newpms int(10) NOT NULL default '0',
unreadpms int(10) NOT NULL default '0',
KEY username (username),
KEY usergroup (usergroup),
KEY birthday (birthday),
PRIMARY KEY (uid)
) TYPE=MyISAM{$charset};";
|
As you can see:
username varchar(120) NOT NULL default '',
password varchar(120) NOT NULL default '',
salt varchar(10) NOT NULL default '',
|
|
|
|
|
|
|
|
|
Posted: Sun Jan 06, 2008 3:04 am |
|
|
Dolorious |
Regular user |
|
|
Joined: Jan 05, 2008 |
Posts: 5 |
|
|
|
|
|
|
|
WAIT!
I have the salts now.
[+] MD5-Hash: 7ec43d090f6f09e9322774495d40b9d3
[*] Salt: NnERoVyv
[+] MD5-Hash: 7ebca3ee49ee1c6ee775b6b4a065ec72
[*] Salt: 7wlnikfC |
|
|
|
|
Posted: Sun Jan 06, 2008 6:54 am |
|
|
Dolorious |
Regular user |
|
|
Joined: Jan 05, 2008 |
Posts: 5 |
|
|
|
|
|
|
|
Bump?
|
|
|
|
|
Posted: Sun Jan 06, 2008 2:56 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
Found one of passwords, using Passwords Pro cracker:
:7ebca3ee49ee1c6ee775b6b4a065ec72:7wlnikfC:mazzuca:
|
|
|
|
|
Posted: Sun Jan 06, 2008 6:58 pm |
|
|
Dolorious |
Regular user |
|
|
Joined: Jan 05, 2008 |
Posts: 5 |
|
|
|
|
|
|
|
Oh shit man, you are the man!!!!! |
|
|
|
|
Posted: Sun Jan 06, 2008 8:33 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
And second hash got cracked too:
:7ec43d090f6f09e9322774495d40b9d3:NnERoVyv:7129721:
|
|
|
|
|
Posted: Sun Jan 06, 2008 10:46 pm |
|
|
Dolorious |
Regular user |
|
|
Joined: Jan 05, 2008 |
Posts: 5 |
|
|
|
|
|
|
|
Thanks man so much!!
I love you man!!! |
|
|
|
|
Posted: Fri Feb 01, 2008 10:57 pm |
|
|
kallas |
Beginner |
|
|
Joined: Feb 02, 2008 |
Posts: 2 |
|
|
|
|
|
|
|
Hello, good info here.
I have a problem with mybb hash. I don`t no what`s the salts and how to find them. Please help me!
And one question if u don`t mind: In PaswordsPro, what type of hash i need select for mybb hash (md5(md5($pass).$salt)[PHP], or what?)?
Thanks very much friends. |
|
|
|
|
Posted: Sat Feb 02, 2008 12:23 am |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
Salt is in same sql table as password hash. Look above - i have allready explained that before
And algorithm is:
md5(md5($salt).md5($pass)) |
|
|
|
|
Posted: Sat Feb 02, 2008 1:24 pm |
|
|
kallas |
Beginner |
|
|
Joined: Feb 02, 2008 |
Posts: 2 |
|
|
|
|
|
|
|
Thanks very much. |
|
|
|
|
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|