Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
March 29, 2024
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 885
Members: 0
Total: 885
PacketStorm News
·301 Moved Permanently

read more...
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other hashes -> Need A Hash Cracked -- Reward As Always!
Post new topic  Reply to topic View previous topic :: View next topic 
Need A Hash Cracked -- Reward As Always!
PostPosted: Sun May 25, 2008 10:20 pm Reply with quote
wowhelp
Regular user
Regular user
 
Joined: May 14, 2008
Posts: 20




converge_pass_hash: a6214086ae68fc1f1df4aba78653d729
converge_pass_salt: mxMUg

That is what I need cracked. The first person to crack it will receive dedicated access to my private server with a list of over 100 vhosts. The winner is on a first-come first-serve basis and will be announced as always!

Happy hunting! Smile

::Keep in mind that I offer these rewards as a form of gratitude to respect those who take the time to provide other peoples needs and so forth::

When you crack it, make your post here so people are aware of the winner and also PM it to me so I get notified. Thanks in advance!
View user's profile Send private message
PostPosted: Mon May 26, 2008 10:10 am Reply with quote
lenny
Valuable expert
Valuable expert
 
Joined: May 15, 2008
Posts: 275




Running it through PasswordsPro right now with my custom personal 30gb wordlist Smile This is gonna take a looooong time Wink

EDIT:10 minutes in, and I am 4% through the list..

EDIT: 36 minutes in - now i'm 28% through the wordlist. Thats 1586905482 passwords!

EDIT: 1hour 25 minutes into the crack. 68% of the wordlist has been completed at a rate of 543483 passwords per second giving a current total of 2819800273 password attempts. Still no result.

EDIT: 2 hours into the crack. Still no result. 88% of the wordlist has been completed. 3627813888 passwords have been attempted at an average rate of 516038 passwords per second. This is one tricky hash! If my next wordlist does not do it, I strongly doubt if anybody can do it!

EDIT: 2 hours, 16 minutes and 52 seconds after first attempt. ~4.1 billion passwords attempted to no result. This is one hell of a hash.

Let me get this straight - a converge hash is one used by IPB which is md5(md5(pass).md5(salt)) ?

Ok, I will not start my second (and final?) attempt using my small wordlist. If this dosen't work, i'll bring out the rainbow table disks!

Anyway, 13:20 (GMT) - Attempt #2. I'll let you know the results Smile

Main Dictionary 1 (243mb): 40 seconds - 22.4 million passwords - no result

Main Dictionary 2 (1.87gb): 7minutes 12 seconds - 249.3 million passwords attempted - no result.

Other Dictionary: 23 seconds, didnt have time to see how many passwords were attempted - no result.

Overall: ~4.4 billion passwords attempted - No result - sorry mate Sad

(PS, i will be very impressed with anybody that manages to get this!)
View user's profile Send private message
PostPosted: Mon May 26, 2008 12:41 pm Reply with quote
maku234
Regular user
Regular user
 
Joined: Jun 03, 2007
Posts: 21
Location: estonia




lenny wrote:

Let me get this straight - a converge hash is one used by IPB which is md5(md5(pass).md5(salt)) ?

IPB uses
md5(md5($salt).md5($hash))
View user's profile Send private message
PostPosted: Mon May 26, 2008 1:01 pm Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




You mean md5(md5($salt).(md5($pass)) ? Smile
And by the way this post is in wrong subforum because it's SALTED hash.
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Mon May 26, 2008 1:06 pm Reply with quote
maku234
Regular user
Regular user
 
Joined: Jun 03, 2007
Posts: 21
Location: estonia




waraxe wrote:
You mean md5(md5($salt).(md5($pass)) ? Smile

yes Razz
View user's profile Send private message
PostPosted: Mon May 26, 2008 1:10 pm Reply with quote
lenny
Valuable expert
Valuable expert
 
Joined: May 15, 2008
Posts: 275




Ok, so i was doing it right then Smile
Anybody else have anything to add? Waraxe? You are the god of rainbow tables Smile
View user's profile Send private message
PostPosted: Mon May 26, 2008 1:13 pm Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




No use of rainbow tables in case of salted hashes ...
And by the way, it seems that your algorithm was still wrong (backwards?) ...
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Mon May 26, 2008 1:43 pm Reply with quote
lenny
Valuable expert
Valuable expert
 
Joined: May 15, 2008
Posts: 275




Great. Oh well - I am running it again, but I would like to know who else is trying and what method they are using Smile This makes for great PC benchmarking Smile
View user's profile Send private message
PostPosted: Mon May 26, 2008 1:53 pm Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




Talking about PC power - last time i checked, Passwordspro was utilizing 50% of my dual core capacity. When will Passwordspro support dual-,triple- and multicore?
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Mon May 26, 2008 2:12 pm Reply with quote
lenny
Valuable expert
Valuable expert
 
Joined: May 15, 2008
Posts: 275




Well I use PasswordsPro with a Intel Core 2 Quad Q6600... I hadn't noticed it only utilising 1 core Sad So in theory, a Pentium 4 would be just as effective as a Q6600? Oh well, Ill just shift the affinity over to the last core which is hardly being used right now...
View user's profile Send private message
PostPosted: Mon May 26, 2008 4:21 pm Reply with quote
lenny
Valuable expert
Valuable expert
 
Joined: May 15, 2008
Posts: 275




Ok, I have run the hash through all 4.4 billion combinations once again. No luck.
View user's profile Send private message
PostPosted: Tue May 27, 2008 6:10 am Reply with quote
wowhelp
Regular user
Regular user
 
Joined: May 14, 2008
Posts: 20




Heh, well thanks for trying anyway people. If anyone does manage to get it, you know how to reach me. Smile

PS.. Lenny, did you get my private message from over a week ago about the last hash? I sent it but haven't seen you active on the Network. Just want to make sure everything went well. Thanks again in advance.
View user's profile Send private message
Need A Hash Cracked -- Reward As Always!
  www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

  
  
 Post new topic  Reply to topic  




Powered by phpBB © 2001-2008 phpBB Group






Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2020 Janek Vind "waraxe"
Page Generation: 0.148 Seconds