 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 312
Members: 0
Total: 312
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
Help, really important to me. |
 |
Posted: Thu Sep 11, 2008 9:30 pm |
|
|
SkorDuck555 |
Beginner |

 |
|
Joined: Sep 12, 2008 |
Posts: 4 |
|
|
|
 |
 |
 |
|
Well, After spending many sleepless hours of constant exploiting and usually failed attempts to break into an Admin's account in a VB forum that I go to, I finally got hold of it. Now, I only need to crack it, but the problem is, I have no idea if it's salted or not. But I'm not exactly sure if it's an MD5 hash. I tried RainBowCrack tables, MD5 search, dictionary attacks and possibly every online hash cracker I know to "decrypt" it, but it doesn't seem to work. Now that I stumbled upon this place. I'm asking for help to either crack or at least give me a few heads up on how to do it, I know, it might be a lot to ask for but please help a newbie like me.
Here's the hash..hex..whatever you call it. xD
ffeda7990af005b70ab5dc4d3836cd8.
Thanks in advance,
My regards. |
|
|
|
|
 |
 |
|
 |
Posted: Fri Sep 12, 2008 6:38 am |
|
|
ZiPo |
Advanced user |

 |
|
Joined: Jul 08, 2008 |
Posts: 86 |
|
|
|
 |
 |
 |
|
Well if it's from vBulletin forum then no online or Rainbowtable cracker won't help because without "salt" it's impossible to crack it. So please provide salt with this hash and I'll see what i can do. |
|
|
|
|
Posted: Fri Sep 12, 2008 3:01 pm |
|
|
SkorDuck555 |
Beginner |

 |
|
Joined: Sep 12, 2008 |
Posts: 4 |
|
|
|
 |
 |
 |
|
Darn it, I knew I was missing something.
I have no idea how to get this "salt" thing unless I go mine for it in the sea or something. Thanks for your help anyway, I'll see what I can find... |
|
|
|
|
Posted: Fri Sep 12, 2008 5:25 pm |
|
|
Cablekid |
Advanced user |

 |
|
Joined: Jul 14, 2007 |
Posts: 85 |
|
|
|
 |
 |
 |
|
The salt is in the database, not sure if you got the Hash from the database but if you did, look for the salt. |
|
|
|
|
www.waraxe.us Forum Index -> Hash related information
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|