 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 290
Members: 0
Total: 290
|
|
|
|
|
 |
Full disclosure |
 |
Google Firebase hosting suspension / "malware distribution"bypass
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
Invision Salted MD5 |
 |
Posted: Thu Apr 05, 2007 5:59 am |
|
|
WiRED |
Beginner |

 |
|
Joined: Mar 30, 2007 |
Posts: 1 |
|
|
|
 |
 |
 |
|
Hey guys,
I am aware that Invision use Salted MD5's.. I have managed to SQL Inject and get ALL the MD5's + Salts..
I tried the program from www.md5this.com and put the MD5+Salt in the program and select the dictionary.. But it doesn't crack, bummer
I was wondaring if someone by any change could crack these:
MD5 = 2097ff8fcffb8ccb9145488d46c92e22 - Salted: = )1ktH
MD5 = 77bfa8996d0d2f02eb78c95ada490501 - Salted: = =xF&R
MD5 = 4f4e6e0fad1d35499c1d6a0be6ea3ed5 - Salted: = 51!W(
Anyone, please reply
Cheers, |
|
|
|
|
 |
Re: Invision Salted MD5 |
 |
Posted: Mon Apr 09, 2007 12:46 pm |
|
|
ToXiC |
Moderator |

 |
|
Joined: Dec 01, 2004 |
Posts: 181 |
Location: Cyprus |
|
|
 |
 |
 |
|
WiRED wrote: | Hey guys,
I am aware that Invision use Salted MD5's.. I have managed to SQL Inject and get ALL the MD5's + Salts..
I tried the program from www.md5this.com and put the MD5+Salt in the program and select the dictionary.. But it doesn't crack, bummer
I was wondaring if someone by any change could crack these:
MD5 = 2097ff8fcffb8ccb9145488d46c92e22 - Salted: = )1ktH
MD5 = 77bfa8996d0d2f02eb78c95ada490501 - Salted: = =xF&R
MD5 = 4f4e6e0fad1d35499c1d6a0be6ea3ed5 - Salted: = 51!W(
Anyone, please reply
Cheers, |
hashes will crack depending on the wordlist you will use on md5this program ..
there is a possibility that the salted function of IPB is different than the one on that tool .. ( Everybody can change it anyway)
if you got that function right .. i could implement it to the software ..
.... I would recomment you though , to use bigger and different wordlists
ToXiC |
|
_________________ who|grep -i blonde|talk; cd~;wine;talk;touch;unzip;touch; strip;gasp;finger;gasp;mount; fsck; more; yes; gasp; umount; make clean; sleep;wakeup;goto http://www.md5this.com |
|
|
|
 |
 |
|
 |
Posted: Sun Apr 15, 2007 12:08 am |
|
|
Sm0ke |
Moderator |

 |
|
Joined: Nov 25, 2006 |
Posts: 141 |
Location: Finland |
|
|
 |
 |
 |
|
found one of those
MD5 = 77bfa8996d0d2f02eb78c95ada490501=danielm |
|
|
|
|
Posted: Fri Jul 13, 2007 3:17 pm |
|
|
leetupload |
Regular user |

 |
|
Joined: Jul 13, 2007 |
Posts: 5 |
|
|
|
 |
 |
 |
|
Anyone care to help me out with my IPB MD5+Salt?
Would be greatly appreciated. Tired of going through days with no luck.
MD5: 50b03b26edf1772c9977a3dd6168fad1 Salt: @{[
MD5: fa5312bc842ea3b5b4bebc28e6c3cbe9 Salt: *Es
This is 3.*.* IPB, so the method is: md5(md5($salt).md5($hash))
Many thanks in advance! |
|
|
|
|
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|