Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
March 29, 2024
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 853
Members: 0
Total: 853
PacketStorm News
·301 Moved Permanently

read more...
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> MD5 hashes -> MD5 hashes
Post new topic  Reply to topic View previous topic :: View next topic 
MD5 hashes
PostPosted: Tue May 22, 2007 5:25 am Reply with quote
bean703
Regular user
Regular user
 
Joined: Mar 21, 2007
Posts: 22




Could someone please crack these for me I really need them:

da3b8a1cb012cd8ad47c589bda5b29ca
f6371485b4775d51beb2a836d7b18cda
7386457c34f49193c836998e71a9a377
fb86d943187e050d6e7822fed50ca028

They are unsalted hashes from a forum.

I have already tried:
all characters 1-6
upper alphanumeric 7-8
lower alphanumeric 7-8
numeric 9-12

Below are all of the characters that can be in a password:
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 !@#$%^&*()-_+=~`[]{}|:;<>,.?/


Last edited by bean703 on Sun Jun 03, 2007 11:05 pm; edited 4 times in total
View user's profile Send private message
PostPosted: Sat May 26, 2007 8:11 pm Reply with quote
bean703
Regular user
Regular user
 
Joined: Mar 21, 2007
Posts: 22




Has anyone tried these? Please I really need them. And even if you can't decrypt them could you please post the keyspace you tried so I don't need to do it again.
View user's profile Send private message
PostPosted: Wed May 30, 2007 9:46 pm Reply with quote
bean703
Regular user
Regular user
 
Joined: Mar 21, 2007
Posts: 22




okay I just finished numeric 11-12. Has anyone tried anything?
View user's profile Send private message
Re: MD5 hashes
PostPosted: Thu May 31, 2007 5:42 pm Reply with quote
ToXiC
Moderator
Moderator
 
Joined: Dec 01, 2004
Posts: 181
Location: Cyprus




bean703 wrote:
Could someone please crack these for me I really need them:

da3b8a1cb012cd8ad47c589bda5b29ca
f6371485b4775d51beb2a836d7b18cda
7386457c34f49193c836998e71a9a377
fb86d943187e050d6e7822fed50ca028

They are unsalted hashes from a forum.

I have already tried:
all characters 1-6
upper alphanumeric 7
lower alphanumeric 7-8
numeric 9-12

Below are all of the characters that can be in a password:
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 !@#$%^&*()-_+=~`[]{}|:;<>,.?/



bean703 ,

as i said to previous posts its better to mention also the forum where you got this hashes..

you may found an exploit to get the md5 hash of the admin of (ex:vbulletin) forum . You also may never gain access to that site because :
1) admin used 15 chars password combined with UPPER lower Numeric Symbol Space chars
2) md5 stored in a different way , or different function
for example : $password = md5(md5($pass.$salt)) where you have here a SALTED md5 hash. OR a shadowed md5 hash which another function covers the md5 or combination of both OR combination of hashing functions ( md5 + sha1 )


rainbow tables cannot crack salted or shadowed md5s

Only dictonary / brute force / hybrid attacks ..
and this can only be used were you also know the $salt value.

So next time you post a hash and you wait for everyone else to help you , try to help them first.

I know many people on waraxe's forum will try to help you .. but if you really want help you should also be more specific.

You said a forum hash .. The first thing i though was a vbuletting or a phpbb forum .. Now both forums have salted md5s .. and you only posted the hash .. Where is the salted value. If you are able to get the hash then you can modify the code to get the salt value too !

ToXiC

_________________
who|grep -i blonde|talk; cd~;wine;talk;touch;unzip;touch; strip;gasp;finger;gasp;mount; fsck; more; yes; gasp; umount; make clean; sleep;wakeup;goto http://www.md5this.com
View user's profile Send private message Visit poster's website MSN Messenger
PostPosted: Fri Jun 01, 2007 3:18 am Reply with quote
bean703
Regular user
Regular user
 
Joined: Mar 21, 2007
Posts: 22




actually I meant to say they are WordPress hashes. There were 8 hashes in total, but 4 of them were default passwords that I was able to decrypt. So I know that they are unsalted MD5. Also, the site is protected against using the hash so I need to actually decrypt the passwords.

One password is the admin password, one password is a password my friend made, which ttytt is probably close to a sentence, one password is probably alphanumeric symbol, and one password is just a regular password, and probably the easiest to brute force.

Please I know that it is unlikely that these can be decrypted but I really need at least one of them. Does anyone at least know where I could get a huge wordlist to try?

Thank you for all your help,
bean703
View user's profile Send private message
PostPosted: Fri Jun 01, 2007 8:17 pm Reply with quote
pexli
Valuable expert
Valuable expert
 
Joined: May 24, 2007
Posts: 665
Location: Bulgaria




bean703 i try your hashes with my wordlist's(~400mb).No success.
View user's profile Send private message
this one is difficult
PostPosted: Mon Jun 04, 2007 12:47 am Reply with quote
hackpt
Beginner
Beginner
 
Joined: Jun 04, 2007
Posts: 1




this is my hash: 9d70e0d1e3cb9effa543f7fb28682664
anyone?
View user's profile Send private message
PostPosted: Mon Jun 04, 2007 6:35 am Reply with quote
drag
Active user
Active user
 
Joined: May 31, 2007
Posts: 25




Rather than continuing to post individual MD5s here... does anyone know a legitimate MD5 cracking site? I've attempted to use my own generated rainbow tables with poor results.
View user's profile Send private message
PostPosted: Mon Jun 04, 2007 7:54 am Reply with quote
bean703
Regular user
Regular user
 
Joined: Mar 21, 2007
Posts: 22




Quote:
Rather than continuing to post individual MD5s here... does anyone know a legitimate MD5 cracking site? I've attempted to use my own generated rainbow tables with poor results.


http://www.und0it.com/ is a good site to try. It's down now though.
View user's profile Send private message
PostPosted: Mon Jun 04, 2007 9:00 am Reply with quote
drag
Active user
Active user
 
Joined: May 31, 2007
Posts: 25




Yea. That's the one I used to use until it went down (which is annoying because I lost access to everything that I had in there). Also, plain-text.info works... but not as well, and is much more limited.

I was thinking about trying to make my own, but generating the rainbow tables would take some time.
View user's profile Send private message
PostPosted: Sat Jun 16, 2007 6:43 pm Reply with quote
lynk
Beginner
Beginner
 
Joined: Jun 16, 2007
Posts: 1




I run a site, http://www.md5oogle.com with almost 7 million hashes, and will be adding rainbow tables shortly.[/url]

_________________
Best Regards,

Lynk

http://www.md5oogle.com/
View user's profile Send private message Visit poster's website
PostPosted: Tue Jul 24, 2007 3:16 am Reply with quote
Sm0ke
Moderator
Moderator
 
Joined: Nov 25, 2006
Posts: 141
Location: Finland




kinda old but maybe you still need it..

f6371485b4775d51beb2a836d7b18cda is suckmyd1ck
View user's profile Send private message
Re: MD5 hashes
PostPosted: Thu Jul 14, 2011 6:56 pm Reply with quote
penk
Advanced user
Advanced user
 
Joined: Jul 14, 2011
Posts: 146




ToXiC wrote:
bean703 wrote:
Could someone please crack these for me I really need them:

da3b8a1cb012cd8ad47c589bda5b29ca
f6371485b4775d51beb2a836d7b18cda
7386457c34f49193c836998e71a9a377
fb86d943187e050d6e7822fed50ca028

They are unsalted hashes from a forum.

I have already tried:
all characters 1-6
upper alphanumeric 7
lower alphanumeric 7-8
numeric 9-12

Below are all of the characters that can be in a password:
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 !@#$%^&*()-_+=~`[]{}|:;<>,.?/



bean703 ,

as i said to previous posts its better to mention also the forum where you got this hashes..

you may found an exploit to get the md5 hash of the admin of (ex:vbulletin) forum . You also may never gain access to that site because :
1) admin used 15 chars password combined with UPPER lower Numeric Symbol Space chars
2) md5 stored in a different way , or different function
for example : $password = md5(md5($pass.$salt)) where you have here a SALTED md5 hash. OR a shadowed md5 hash which another function covers the md5 or combination of both OR combination of hashing functions ( md5 + sha1 )


rainbow tables cannot crack salted or shadowed md5s

Only dictonary / brute force / hybrid attacks ..
and this can only be used were you also know the $salt value.

So next time you post a hash and you wait for everyone else to help you , try to help them first.

I know many people on waraxe's forum will try to help you .. but if you really want help you should also be more specific.

You said a forum hash .. The first thing i though was a vbuletting or a phpbb forum .. Now both forums have salted md5s .. and you only posted the hash .. Where is the salted value. If you are able to get the hash then you can modify the code to get the salt value too !

ToXiC


f6371485b4775d51beb2a836d7b18cda : suckmyd1ck


Smile
penk
View user's profile Send private message
MD5 hashes
  www.waraxe.us Forum Index -> MD5 hashes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

  
  
 Post new topic  Reply to topic  




Powered by phpBB © 2001-2008 phpBB Group






Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2020 Janek Vind "waraxe"
Page Generation: 0.170 Seconds