|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 60
Members: 0
Total: 60
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
some vBulletin hashes + salt |
|
Posted: Tue Sep 09, 2008 7:57 pm |
|
|
HellMonKeY |
Regular user |
|
|
Joined: Mar 17, 2008 |
Posts: 17 |
|
|
|
|
|
|
|
I got a few vBulletin hashes that need to be cracked
"Mn::bfb115723009fc1d20e135f678395b8a
,q6::3b5233f7f1d61d08274070cfdc80371d
W{x::7151096b1ec6c1a663837501066fa139
(C'::981c481a314c18bdd23343f8c181c56c
d[)::dee4347ddbc30d25969db8f9d3e4f8ed
2Yt::877ac455e0edac49823cff51b615aaaf
moF::1188cd2aff460b648bb89380b16c3e42
JYu::30bf322f5adf5178c330203161b66c3d
73]::b2f2dc6e0b704a9ccb11d9d460aba4a5
moF::1188cd2aff460b648bb89380b16c3e42
#3r::7d5e61ad3d790ae117c3a905a08c8e1e
WCN::9407252238f022117f4fd1c769cbba22
b:2::9f5bcb21192810954933e4a0180e285b
,do::3fa1afda9f445c437b5a57ae3087c6a4
nLg::e7b817b3bd0109cc74ad108b8ae92d77
H[r::7c3bc3b34a3012d7849e662ca154247b
WD~::46f8d852d943baf7119f09971fbc7d87
format is; SALT::hash
vBulletin uses md5(md5(pass) . salt))
Thanks in advance |
|
|
|
|
|
|
|
|
Posted: Tue Sep 09, 2008 10:03 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
Plaintext of 3fa1afda9f445c437b5a57ae3087c6a4 is highwind
|
|
|
|
|
Posted: Wed Sep 10, 2008 2:41 am |
|
|
HellMonKeY |
Regular user |
|
|
Joined: Mar 17, 2008 |
Posts: 17 |
|
|
|
|
|
|
|
Thanks waraxe
this is what i got so far:
W{x::7151096b1ec6c1a663837501066fa139 -> 588469
WCN::9407252238f022117f4fd1c769cbba22 -> slxdv5
nLg::e7b817b3bd0109cc74ad108b8ae92d77 -> somni7
so no need cracking those =] |
|
|
|
|
Posted: Wed Sep 10, 2008 11:16 am |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
Plaintext of 46f8d852d943baf7119f09971fbc7d87 is 1473309
Plaintext of 981c481a314c18bdd23343f8c181c56c is Harmonia
Plaintext of 7d5e61ad3d790ae117c3a905a08c8e1e is barata07
Plaintext of 3b5233f7f1d61d08274070cfdc80371d is klokje24
|
|
|
|
|
Posted: Wed Sep 10, 2008 5:01 pm |
|
|
HellMonKeY |
Regular user |
|
|
Joined: Mar 17, 2008 |
Posts: 17 |
|
|
|
|
|
|
|
Damn man, thanks alot!
I wonder how you're doing it that fast :O
It would take my computer about 4 days to crack such a password :-/ |
|
|
|
|
Posted: Wed Sep 10, 2008 5:08 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
Plaintext of 30bf322f5adf5178c330203161b66c3d is potter11
Right now i'm using hybrid dictionary attack. It's usually faster then bruteforce. |
|
|
|
|
Posted: Thu Sep 11, 2008 1:13 am |
|
|
HellMonKeY |
Regular user |
|
|
Joined: Mar 17, 2008 |
Posts: 17 |
|
|
|
|
|
|
|
waraxe wrote: | Plaintext of 30bf322f5adf5178c330203161b66c3d is potter11
Right now i'm using hybrid dictionary attack. It's usually faster then bruteforce. |
Thanks again
How big is the dictionary you're using? And what files are you using for the rules and "replace symbols in the passwords"? I'm trying a hybrid myself right now, but it seems to take forever with 2.40GB wordlists :/ |
|
|
|
|
Posted: Thu Sep 11, 2008 1:18 am |
|
|
mge |
Valuable expert |
|
|
Joined: Jul 16, 2008 |
Posts: 142 |
|
|
|
|
|
|
|
i don't know if that's what waraxe is using but cybra posted a 28 gb word list in a 70 mb rar a while ago in this forum.
you can find it here
|
|
|
|
|
Posted: Thu Sep 11, 2008 10:53 am |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
I'm using my own wordlist, compilation from many sources, sorted and normalized. It's compact, but very effective |
|
|
|
|
Posted: Thu Sep 11, 2008 1:55 pm |
|
|
HellMonKeY |
Regular user |
|
|
Joined: Mar 17, 2008 |
Posts: 17 |
|
|
|
|
|
|
|
mge wrote: | i don't know if that's what waraxe is using but cybra posted a 28 gb word list in a 70 mb rar a while ago in this forum.
you can find it here
|
Using a 28GB wordlist for a hybrid attack will, i guess, take a few weeks or even more :/
But the thing i'm most interested in, is the .kbt file and the rules.txt file you're using. Is it the one that is default with PasswordPro that you are using? |
|
|
|
|
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|