Waraxe IT Security Portal
Login or Register
November 17, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 55
Members: 0
Total: 55
Full disclosure
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other hashes -> IPB 2.3.5 Hash Help?
Post new topicReply to topic View previous topic :: View next topic
IPB 2.3.5 Hash Help?
PostPosted: Sat Nov 15, 2008 6:13 pm Reply with quote
renaker
Active user
Active user
Joined: Nov 15, 2008
Posts: 27




Hash: d7b22e1b6a5e2d8ebd02900647596433
Salt: h[Gc>

or

Hash: f8a61450f592777c189d25e54ee70742
Salt: nlR1T

or this one, which would be the best, but is probably the hardest to attack

Hash: ce092fe7d7361e52a0a2a8afa27116e0
Salt: ?1~%$

I know I'm brand new, but would anybody be up to helping retrieve the password associated with this hash and salt? It's to an IPB 2.3.5 board. I would go far enough to call you my mortal Jesus for any help regarding this issue. I hopefully only need one of those passes.<3
View user's profile Send private message
PostPosted: Sat Nov 15, 2008 8:58 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




Plaintext of ce092fe7d7361e52a0a2a8afa27116e0 is password

Smile
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Sat Nov 15, 2008 11:03 pm Reply with quote
renaker
Active user
Active user
Joined: Nov 15, 2008
Posts: 27




Wow, you ARE my mortal Jesus. Out of curiosity, why kind of system are you using? Anything to do with elcomsoft? I'm a newb when it comes to hash's.
View user's profile Send private message
PostPosted: Sat Nov 15, 2008 11:14 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




I'm using these two excellent utilities:

http://www.insidepro.com/eng/passwordspro.shtml

http://www.insidepro.com/eng/egb.shtml
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Sun Nov 16, 2008 4:56 am Reply with quote
renaker
Active user
Active user
Joined: Nov 15, 2008
Posts: 27




I tried googling it, but I failed. Would you mind posting the hash format that ipb 2.3.5 uses? like: MD5($salt.$pass.$salt); or whatever it happens to be. I'm trying to learn how to use the tools you showed me. I wish I had the graphics card to go with it, lol. I'd much rather learn to do this on my own instead of begging for help every time I need a hash cracked. Thanks in advance if you decide to post. Btw, this site rocks. It's not normal policy for a newbie to join and get that level of help. I really appreciate it.

EDIT:

I found this on the site, but is this true for 2.3.5?

"Just let me know what you think, and I might implement an md5 bruteforcer that supports IPB md5(md5(salt).md5(pwd)) hashing algorithm and uses this method to bruteforce your hashes..."
View user's profile Send private message
PostPosted: Sun Nov 16, 2008 4:17 pm Reply with quote
Pinox
Regular user
Regular user
Joined: Dec 22, 2005
Posts: 13




Yeah that's right just download passwordspro find a good wordlist and use this setting to try and crack the hash:

Code:
md5(md5($salt).md5($pass))


Smile
View user's profile Send private message
PostPosted: Mon Nov 17, 2008 6:07 pm Reply with quote
renaker
Active user
Active user
Joined: Nov 15, 2008
Posts: 27




Pinox wrote:
Yeah that's right just download passwordspro find a good wordlist and use this setting to try and crack the hash:

Code:
md5(md5($salt).md5($pass))


Smile


Smile Thanks man, also, would you happen to know where to find a decent wordlist? I downloaded every wordlist at:

http://www.insidepro.com/eng/download.shtml

but so far I've only had like 30% success rate, and it's only finding really simple passes. Would you happen to know where to find a really good list?
View user's profile Send private message
IPB 2.3.5 Hash Help?
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.046 Seconds