Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
March 29, 2024
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 865
Members: 0
Total: 865
PacketStorm News
·301 Moved Permanently

read more...
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other hashes -> IPB Hash + Salt
Post new topic  Reply to topic View previous topic :: View next topic 
IPB Hash + Salt
PostPosted: Wed Jan 06, 2010 4:02 pm Reply with quote
jRiddick
Beginner
Beginner
 
Joined: Jan 06, 2010
Posts: 4




Hi
i have these 2 hashes that i have been working on for quite a while testing method such as simple dictionary attack and gpu bruteforce attack using ighashgpu (did bruteforce for about 1-2 hours not longer cuz it was really loud (fan at 100%)). I have about 10 wordlists that i have gotten from links from this forum. I haven't been able to test Combined Dictionary Attack since it just hangs at loading in to memory. but if you crack them please help me and tell me how you did it Very Happy or just tell me how i should do it Smile

Anyways heres the Hashes:
1:a5839fb96a74ffe5a054c9751b5fae8f::4B,*
2:a39015dec141e4eee728d18da3cf6f80:H(]]_

Thanks so much
and Kind Regards
jRiddick
View user's profile Send private message
PostPosted: Wed Jan 06, 2010 4:39 pm Reply with quote
vince213333
Advanced user
Advanced user
 
Joined: Aug 03, 2009
Posts: 737
Location: Belgium




a5839fb96a74ffe5a054c9751b5fae8f:challenge

How about starting with simple dictoinary attacks, instead of talking about bruteforcing with GPU's and trying Combined attacks
Confused
View user's profile Send private message
Tried that
PostPosted: Wed Jan 06, 2010 4:42 pm Reply with quote
jRiddick
Beginner
Beginner
 
Joined: Jan 06, 2010
Posts: 4




hehe thanks Very Happy
well i tried doing regular dict attacks with no success ( must have done something wrong) downloaded like 10 dictionaries but couldn't find it. well have to start figuring out the problem. I tried with your dictionaries to but something must have gone wrong while i did it.

EDIT: The dicts couldnt find the second one Razz i did succeed with the first one now ( did enter the wrong hash type before) running a dict attack at the second one right now too see if i get this now. Added the 24GB Dictionary.
View user's profile Send private message
PostPosted: Sat Jan 09, 2010 4:28 am Reply with quote
Mooka91
Advanced user
Advanced user
 
Joined: Aug 15, 2009
Posts: 73




24GB list is shit.
View user's profile Send private message
PostPosted: Sat Jan 09, 2010 12:56 pm Reply with quote
AIR_Nayden
Advanced user
Advanced user
 
Joined: Dec 30, 2009
Posts: 70
Location: Bulgaria




then give somethin better Wink
View user's profile Send private message
PostPosted: Sat Jan 09, 2010 5:55 pm Reply with quote
vince213333
Advanced user
Advanced user
 
Joined: Aug 03, 2009
Posts: 737
Location: Belgium




Mooka91 is right, all those large dictionaries are crap. Mostly people just rip every file they can get hold of and put the lines in dictionary files...

I've seen lines with
Code:
var $blah = 2;

for example.

They also tend to have loads and loads of duplicates.

Let me tell you, I once had 8 or 9 GB of different dictionaries. After removed every single duplicate line and filtering the crap out of it, I had 2.5 GB left.

So don't bother downloading dictionaries of 24 GB because they're no good and it also takes ages to run any attack with them Wink


Also, most programs can't even handle such large files because for most attacks, the dictionaries are loaded into the memory. And I can't really imagine having 24 GB of system memory Confused
View user's profile Send private message
PostPosted: Mon Jan 11, 2010 5:37 am Reply with quote
Mooka91
Advanced user
Advanced user
 
Joined: Aug 15, 2009
Posts: 73




http://rapidshare.com/files/333037299/MoPList.rar

My list... used it for 10+ admin passwords off various sites.
View user's profile Send private message
hi and thank you so much waraxe.us
PostPosted: Mon Jan 11, 2010 8:00 am Reply with quote
wer0ckz
Active user
Active user
 
Joined: Jan 11, 2010
Posts: 25
Location: Philippines




hi guys. im new here. how are you guys?
i found this website in exploit.db.com and trying to use your exploit for invision power board.

thank god i found this site.
please i help help how to crack this hashes:

Hash: 903359f388ab42a6b2f7ea6973e58f4b
Salt: 10&cL
------------------------------------------
User ID: 1
Hash: c59d9a472c918bcbe8ed9d2dac288aa7
Salt: %Mt!Y
------------------------------------------
User ID: 1
Hash: 903359f388ab42a6b2f7ea6973e58f4b
Salt: 10&cL
------------------------------------------
User ID: 1
Hash: c59d9a472c918bcbe8ed9d2dac288aa7
Salt: %Mt!Y
------------------------------------------



i cant crack these hashes using lots of online cracker like hashkiller..
please help me.

thank you and more power waraxe.us
View user's profile Send private message AIM Address
IPB Hash + Salt
  www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

  
  
 Post new topic  Reply to topic  




Powered by phpBB © 2001-2008 phpBB Group






Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2020 Janek Vind "waraxe"
Page Generation: 0.129 Seconds