 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 485
Members: 0
Total: 485
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
hash md5 with known plain text salt |
 |
Posted: Sun Dec 01, 2013 1:12 am |
|
|
jini |
Beginner |

 |
|
Joined: Dec 01, 2013 |
Posts: 3 |
Location: germany |
|
|
 |
 |
 |
|
hello every body
I have an md5 hash with a known salt
the salted hash is of this format
md5($salt.$pass)
all what I need is a tool that accept a plain text salt. I searched in the internet but I did not found a a cracker that accepts a plain text salt.
I found only "salted md5 password cracker" that accepts a plain text salt but it has only very few wordlist and is unable to compute large rainbow tables of more than 300 MG
Hashcat and Passwordpro did not work properly on windows xp 32 bits framework
so I would be thankful if someone direct me to a powerful software that accepts an md5 hash with a KNOWN PLAIN TEXT SALT and therefore crack an md5 with a known plain text salt
and i would tankful if someone provide me a link to where i can download great rainbow tables for md5 hash |
|
|
|
|
 |
 |
|
 |
Posted: Sun Dec 01, 2013 11:10 am |
|
|
OxAlien |
Active user |

 |
|
Joined: Apr 11, 2013 |
Posts: 25 |
|
|
|
 |
 |
 |
|
Post the hash here, I may be able to help. |
|
|
|
|
Posted: Sun Dec 01, 2013 5:44 pm |
|
|
OxAlien |
Active user |

 |
|
Joined: Apr 11, 2013 |
Posts: 25 |
|
|
|
 |
 |
 |
|
Hash cracked. check your PM =) |
|
|
|
|
Posted: Wed Jan 22, 2014 9:36 am |
|
|
xiaweiww |
Beginner |

 |
|
Joined: Jan 22, 2014 |
Posts: 3 |
|
|
|
 |
 |
 |
|
Hashcat and Passwordpro did not work properly on windows xp 32 bits framework .
__________
Fifa 14 Coins |
|
|
|
|
www.waraxe.us Forum Index -> MD5 hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|