Waraxe IT Security Portal
Login or Register
February 9, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 102
Members: 0
Total: 102
Full disclosure
Asterisk Security Release 23.2.2
Asterisk Security Release 21.12.1
Asterisk Security Release 22.8.2
Asterisk Security Release 20.18.2
Certified Asterisk Security Release certified-20.7-cert9
SEC Consult SA-20260202-0 :: Multiple vulnerabilities in Native Instruments Native Access (MacOS)
CyberDanube Security Research 20260119-0 | Authenticated Command Injection in Phoenix Contact TC Router Series
[KIS-2026-03] Blesta <= 5.13.1 (2Checkout) Multiple PHP Object Injection Vulnerabilities
[KIS-2026-02] Blesta <= 5.13.1 (Admin Interface) Multiple PHP Object Injection Vulnerabilities
[KIS-2026-01] Blesta <= 5.13.1 (confirm_url) Reflected Cross-Site Scripting Vulnerability
Username Enumeration - elggv6.3.3
Weak Password Complexity - elggv6.3.3
Paper-Exploiting XAMPP Installations
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other hashes -> how to crack these hash
Post new topicReply to topic View previous topic :: View next topic
how to crack these hash
PostPosted: Wed Apr 09, 2008 1:37 pm Reply with quote
king424
Regular user
Regular user
Joined: Apr 03, 2008
Posts: 24




some hashs like this:
sha1$0886b$cdc94575e7567336f11cf2f3f54d1bc75e8dab58
sha1$ac19e$f078cd5101096b4104a35a1f82b1e7d184280092
sha1$e2340$799f8ac603e80cebfa796a205151fa8a89129ebe
sha1$81a7d$9ebd47f1c48aaec5b1511fbf22d7e0efe91d3e3c
[algo]$[salt]$[hexdigest]

passwordspro can crack it?
View user's profile Send private message
PostPosted: Wed Apr 09, 2008 1:39 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




From what source you got this hashes?

What algo? SHA1(pass.salt)? SHA1(SHA1(pass).salt)?
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Wed Apr 09, 2008 1:43 pm Reply with quote
king424
Regular user
Regular user
Joined: Apr 03, 2008
Posts: 24




waraxe wrote:
From what source you got this hashes?

What algo? SHA1(pass.salt)? SHA1(SHA1(pass).salt)?


from Django......i think SHA1(pass.salt)
View user's profile Send private message
PostPosted: Wed Apr 09, 2008 5:42 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




cdc94575e7567336f11cf2f3f54d1bc75e8dab58:kooki2

I was using Passwordspro with SHA1 custom algo:

sha1($username.$pass)

Just use salt instead of username Wink
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Wed Apr 09, 2008 6:27 pm Reply with quote
king424
Regular user
Regular user
Joined: Apr 03, 2008
Posts: 24




waraxe wrote:
From what source you got this hashes?

What algo? SHA1(pass.salt)? SHA1(SHA1(pass).salt)?


thank you waraxe!cracking~~~but need 3days Twisted Evil
View user's profile Send private message
how to crack these hash
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.037 Seconds