Waraxe IT Security Portal
Login or Register
July 23, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 207
Members: 0
Total: 207
Full disclosure
CyberDanube Security Research 20240722-0 | Multiple Vulnerabilities in Perten/PerkinElmer ProcessPlus
[KIS-2024-06] XenForo <= 2.2.15 (Template System) Remote Code Execution Vulnerability
[KIS-2024-05] XenForo <= 2.2.15 (Widget::actionSave) Cross-Site Request Forgery Vulnerability
CVE-2024-33326
CVE-2024-33327
CVE-2024-33328
CVE-2024-33329
CyberDanube Security Research 20240703-0 | Authenticated Command Injection in Helmholz Industrial Router REX100
SEC Consult SA-20240627-0 :: Local Privilege Escalation via MSI installer in SoftMaker Office / FreeOffice
SEC Consult SA-20240626-0 :: Multiple Vulnerabilities in Siemens Power Automation Products
Novel DoS Vulnerability Affecting WebRTC Media Servers
APPLE-SA-06-25-2024-1 AirPods Firmware Update 6A326, AirPods Firmware Update 6F8, and Beats Firmware Update 6F8
40 vulnerabilities in Toshiba Multi-Function Printers
17 vulnerabilities in Sharp Multi-Function Printers
SEC Consult SA-20240624-0 :: Multiple Vulnerabilities allowing complete bypass in Faronics WINSelect (Standard + Enterprise)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other hashes -> Need A Hash Cracked -- Reward As Always!
Post new topicReply to topic View previous topic :: View next topic
Need A Hash Cracked -- Reward As Always!
PostPosted: Sun May 25, 2008 10:20 pm Reply with quote
wowhelp
Regular user
Regular user
Joined: May 14, 2008
Posts: 20




converge_pass_hash: a6214086ae68fc1f1df4aba78653d729
converge_pass_salt: mxMUg

That is what I need cracked. The first person to crack it will receive dedicated access to my private server with a list of over 100 vhosts. The winner is on a first-come first-serve basis and will be announced as always!

Happy hunting! Smile

::Keep in mind that I offer these rewards as a form of gratitude to respect those who take the time to provide other peoples needs and so forth::

When you crack it, make your post here so people are aware of the winner and also PM it to me so I get notified. Thanks in advance!
View user's profile Send private message
PostPosted: Mon May 26, 2008 10:10 am Reply with quote
lenny
Valuable expert
Valuable expert
Joined: May 15, 2008
Posts: 275




Running it through PasswordsPro right now with my custom personal 30gb wordlist Smile This is gonna take a looooong time Wink

EDIT:10 minutes in, and I am 4% through the list..

EDIT: 36 minutes in - now i'm 28% through the wordlist. Thats 1586905482 passwords!

EDIT: 1hour 25 minutes into the crack. 68% of the wordlist has been completed at a rate of 543483 passwords per second giving a current total of 2819800273 password attempts. Still no result.

EDIT: 2 hours into the crack. Still no result. 88% of the wordlist has been completed. 3627813888 passwords have been attempted at an average rate of 516038 passwords per second. This is one tricky hash! If my next wordlist does not do it, I strongly doubt if anybody can do it!

EDIT: 2 hours, 16 minutes and 52 seconds after first attempt. ~4.1 billion passwords attempted to no result. This is one hell of a hash.

Let me get this straight - a converge hash is one used by IPB which is md5(md5(pass).md5(salt)) ?

Ok, I will not start my second (and final?) attempt using my small wordlist. If this dosen't work, i'll bring out the rainbow table disks!

Anyway, 13:20 (GMT) - Attempt #2. I'll let you know the results Smile

Main Dictionary 1 (243mb): 40 seconds - 22.4 million passwords - no result

Main Dictionary 2 (1.87gb): 7minutes 12 seconds - 249.3 million passwords attempted - no result.

Other Dictionary: 23 seconds, didnt have time to see how many passwords were attempted - no result.

Overall: ~4.4 billion passwords attempted - No result - sorry mate Sad

(PS, i will be very impressed with anybody that manages to get this!)
View user's profile Send private message
PostPosted: Mon May 26, 2008 12:41 pm Reply with quote
maku234
Regular user
Regular user
Joined: Jun 03, 2007
Posts: 21
Location: estonia




lenny wrote:

Let me get this straight - a converge hash is one used by IPB which is md5(md5(pass).md5(salt)) ?

IPB uses
md5(md5($salt).md5($hash))
View user's profile Send private message
PostPosted: Mon May 26, 2008 1:01 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




You mean md5(md5($salt).(md5($pass)) ? Smile
And by the way this post is in wrong subforum because it's SALTED hash.
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Mon May 26, 2008 1:06 pm Reply with quote
maku234
Regular user
Regular user
Joined: Jun 03, 2007
Posts: 21
Location: estonia




waraxe wrote:
You mean md5(md5($salt).(md5($pass)) ? Smile

yes Razz
View user's profile Send private message
PostPosted: Mon May 26, 2008 1:10 pm Reply with quote
lenny
Valuable expert
Valuable expert
Joined: May 15, 2008
Posts: 275




Ok, so i was doing it right then Smile
Anybody else have anything to add? Waraxe? You are the god of rainbow tables Smile
View user's profile Send private message
PostPosted: Mon May 26, 2008 1:13 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




No use of rainbow tables in case of salted hashes ...
And by the way, it seems that your algorithm was still wrong (backwards?) ...
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Mon May 26, 2008 1:43 pm Reply with quote
lenny
Valuable expert
Valuable expert
Joined: May 15, 2008
Posts: 275




Great. Oh well - I am running it again, but I would like to know who else is trying and what method they are using Smile This makes for great PC benchmarking Smile
View user's profile Send private message
PostPosted: Mon May 26, 2008 1:53 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




Talking about PC power - last time i checked, Passwordspro was utilizing 50% of my dual core capacity. When will Passwordspro support dual-,triple- and multicore?
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Mon May 26, 2008 2:12 pm Reply with quote
lenny
Valuable expert
Valuable expert
Joined: May 15, 2008
Posts: 275




Well I use PasswordsPro with a Intel Core 2 Quad Q6600... I hadn't noticed it only utilising 1 core Sad So in theory, a Pentium 4 would be just as effective as a Q6600? Oh well, Ill just shift the affinity over to the last core which is hardly being used right now...
View user's profile Send private message
PostPosted: Mon May 26, 2008 4:21 pm Reply with quote
lenny
Valuable expert
Valuable expert
Joined: May 15, 2008
Posts: 275




Ok, I have run the hash through all 4.4 billion combinations once again. No luck.
View user's profile Send private message
PostPosted: Tue May 27, 2008 6:10 am Reply with quote
wowhelp
Regular user
Regular user
Joined: May 14, 2008
Posts: 20




Heh, well thanks for trying anyway people. If anyone does manage to get it, you know how to reach me. Smile

PS.. Lenny, did you get my private message from over a week ago about the last hash? I sent it but haven't seen you active on the Network. Just want to make sure everything went well. Thanks again in advance.
View user's profile Send private message
Need A Hash Cracked -- Reward As Always!
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.116 Seconds