 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 279
Members: 0
Total: 279
|
|
|
|
|
 |
Full disclosure |
 |
Google Firebase hosting suspension / "malware distribution"bypass
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
IPB hashes..please help |
 |
Posted: Tue Mar 24, 2009 10:13 pm |
|
|
unlinkedfire |
Regular user |

 |
|
Joined: Mar 25, 2009 |
Posts: 11 |
|
|
|
 |
 |
 |
|
I have been trying to crack this but can't seem to get anywhere, if anyone would be willing to help, I'd appreciate it:
Code: |
Hash: 0a5fed8d3d1eb59c5f020a7881cb7361
Salt: Bou:8 | [/quote] |
|
|
|
|
Posted: Sat Mar 28, 2009 4:29 pm |
|
|
unlinkedfire |
Regular user |

 |
|
Joined: Mar 25, 2009 |
Posts: 11 |
|
|
|
 |
 |
 |
|
Bump
If no one can do this, can you tell me how I should crack these with Password Pro?
Thanks |
|
|
|
|
Posted: Wed Apr 01, 2009 7:18 pm |
|
|
unlinkedfire |
Regular user |

 |
|
Joined: Mar 25, 2009 |
Posts: 11 |
|
|
|
 |
 |
 |
|
Anyone have any clue what these passwords are? |
|
|
|
|
 |
Re: IPB hashes..please help |
 |
Posted: Thu Apr 02, 2009 4:28 pm |
|
|
crazynou |
Advanced user |

 |
|
Joined: Feb 08, 2009 |
Posts: 199 |
Location: AlGeRiA |
|
|
 |
 |
 |
|
unlinkedfire wrote: | I have been trying to crack this but can't seem to get anywhere, if anyone would be willing to help, I'd appreciate it:
Code: |
Hash: 0a5fed8d3d1eb59c5f020a7881cb7361
Salt: Bou:8 |
| [/quote]
ook hello ...
its salted hash from IPB 2.x.x
algorithm to use is : md5(md5($salt).md5($pass)) php |
|
Last edited by crazynou on Tue Apr 07, 2009 2:50 pm; edited 1 time in total |
|
|
|
Posted: Fri Apr 03, 2009 12:26 pm |
|
|
unlinkedfire |
Regular user |

 |
|
Joined: Mar 25, 2009 |
Posts: 11 |
|
|
|
 |
 |
 |
|
|
|
|
|
Posted: Sat Apr 04, 2009 8:47 pm |
|
|
unlinkedfire |
Regular user |

 |
|
Joined: Mar 25, 2009 |
Posts: 11 |
|
|
|
 |
 |
 |
|
I can't seem to find anything....if anyone would be kind enough to crack it for me, I would be grateful. |
|
|
|
|
 |
 |
|
 |
Posted: Tue Apr 07, 2009 11:32 am |
|
|
NamahS |
Beginner |

 |
|
Joined: Apr 07, 2009 |
Posts: 2 |
|
|
|
 |
 |
 |
|
Sorry for my bad English...)
I have my site on IPB 2.3.4
I make user with password: 129seven ...
...get HASH and SALT in ibf_members_converge
HASH: 1bb74e3732aa9fcbf82c892ebad3bef4
SALT: }Nfd#
....in Password Pro, I use algorithm: md5(md5($pass).md5($salt)) php
...CHECK PASSWORD(129seven)...but...NOTHING...
whats wrong?Algoritm?
************************************************************
Вобщем есть у меня сайт свой на IPB 2.3.4
Завожу пользователя и в табличке ibf_members_converge беру
HASH: 1bb74e3732aa9fcbf82c892ebad3bef4
SALT: }Nfd#
Это все загоняю в Password Pro, алгоритм выбираю md5(md5($pass).md5($salt)) php
Пытаюсь проверить заведомо мне извесный пароль и ничего не выходит.
Там алгоритм шифрования может другой?
Ничего понять не могу. |
|
|
|
|
 |
 |
|
 |
Posted: Tue Apr 07, 2009 2:53 pm |
|
|
crazynou |
Advanced user |

 |
|
Joined: Feb 08, 2009 |
Posts: 199 |
Location: AlGeRiA |
|
|
 |
 |
 |
|
NamahS wrote: | Sorry for my bad English...)
I have my site on IPB 2.3.4
I make user with password: 129seven ...
...get HASH and SALT in ibf_members_converge
HASH: 1bb74e3732aa9fcbf82c892ebad3bef4
SALT: }Nfd#
....in Password Pro, I use algorithm: md5(md5($pass).md5($salt)) php
...CHECK PASSWORD(129seven)...but...NOTHING...
whats wrong?Algoritm?
************************************************************
Вобщем есть у меня сайт свой на IPB 2.3.4
Завожу пользователя и в табличке ibf_members_converge беру
HASH: 1bb74e3732aa9fcbf82c892ebad3bef4
SALT: }Nfd#
Это все загоняю в Password Pro, алгоритм выбираю md5(md5($pass).md5($salt)) php
Пытаюсь проверить заведомо мне извесный пароль и ничего не выходит.
Там алгоритм шифрования может другой?
Ничего понять не могу. |
sorry for the error
use this algorithm md5(md5($salt).md5($pass)) php  |
|
|
|
|
 |
 |
|
 |
Posted: Tue Apr 07, 2009 9:01 pm |
|
|
unlinkedfire |
Regular user |

 |
|
Joined: Mar 25, 2009 |
Posts: 11 |
|
|
|
 |
 |
 |
|
I am trying it now, can you give it a try and let me know if you find something? |
|
|
|
|
Posted: Wed Apr 08, 2009 2:09 am |
|
|
NamahS |
Beginner |

 |
|
Joined: Apr 07, 2009 |
Posts: 2 |
|
|
|
 |
 |
 |
|
Yes:) Algorithm md5(md5($salt).md5($pass)) php
I download another version PPro and all right:)In my version was bag...
Thanks all:) |
|
|
|
|
Posted: Thu Apr 09, 2009 10:39 pm |
|
|
unlinkedfire |
Regular user |

 |
|
Joined: Mar 25, 2009 |
Posts: 11 |
|
|
|
 |
 |
 |
|
Can someone help me out here?
I can't seem to crack it.
Any help would be appreciated. |
|
|
|
|
Posted: Sat Apr 18, 2009 4:09 pm |
|
|
unlinkedfire |
Regular user |

 |
|
Joined: Mar 25, 2009 |
Posts: 11 |
|
|
|
 |
 |
 |
|
Can someone please crack this?
Hash: 0a5fed8d3d1eb59c5f020a7881cb7361
Salt: Bou:8 |
|
|
|
|
Posted: Thu Apr 23, 2009 7:25 pm |
|
|
unlinkedfire |
Regular user |

 |
|
Joined: Mar 25, 2009 |
Posts: 11 |
|
|
|
 |
 |
 |
|
Bump, once again  |
|
|
|
|
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|