 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 304
Members: 0
Total: 304
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
Questions about salted hashes |
 |
Posted: Wed Mar 30, 2011 3:34 pm |
|
|
jmmille |
Regular user |

 |
|
Joined: Mar 30, 2011 |
Posts: 8 |
|
|
|
 |
 |
 |
|
I'm messing with a salted vBulletin hash. I have oclhashcat running trying to solve this with 212 days remaining. Do you guy have any tips for doing it quicker?
27fc3461b192c8a117e7aac20d87a7a6:`Xv
What do you use to bruteforce these kinds of passwords? |
|
|
|
|
 |
Re: Questions about salted hashes |
 |
Posted: Fri Apr 01, 2011 8:25 am |
|
|
ToXiC |
Moderator |

 |
|
Joined: Dec 01, 2004 |
Posts: 181 |
Location: Cyprus |
|
|
 |
 |
 |
|
jmmille wrote: | I'm messing with a salted vBulletin hash. I have oclhashcat running trying to solve this with 212 days remaining. Do you guy have any tips for doing it quicker?
27fc3461b192c8a117e7aac20d87a7a6:`Xv
What do you use to bruteforce these kinds of passwords? |
Hey buddy
oclhashcat is a good start for that..
i would recoment also to try http://hashcat.net/oclhashcat+/
If the password is bigger than 8-9 chars then bruteforce i a bit of a hussle.
Then fingerprint attack is very handy. |
|
_________________ who|grep -i blonde|talk; cd~;wine;talk;touch;unzip;touch; strip;gasp;finger;gasp;mount; fsck; more; yes; gasp; umount; make clean; sleep;wakeup;goto http://www.md5this.com |
|
|
|
 |
 |
|
 |
Posted: Fri Apr 01, 2011 6:49 pm |
|
|
jmmille |
Regular user |

 |
|
Joined: Mar 30, 2011 |
Posts: 8 |
|
|
|
 |
 |
 |
|
Please forgive my ignorance. What's a fingerprint attack? I'm past 8 characters in my bruteforce now with no luck so far.
I don't really see a difference in olcHashcat and oclHashcat+ Is there something obvious that I'm missing there?
Thanks again! |
|
|
|
|
 |
 |
|
 |
Posted: Sat Apr 02, 2011 5:43 pm |
|
|
ToXiC |
Moderator |

 |
|
Joined: Dec 01, 2004 |
Posts: 181 |
Location: Cyprus |
|
|
 |
 |
 |
|
jmmille wrote: | Please forgive my ignorance. What's a fingerprint attack? I'm past 8 characters in my bruteforce now with no luck so far.
I don't really see a difference in olcHashcat and oclHashcat+ Is there something obvious that I'm missing there?
Thanks again! |
There are some hashes that will probably take forever or never cracked.
What Graphics card you have ?
oclhashcat speed depends on the graphics card. |
|
_________________ who|grep -i blonde|talk; cd~;wine;talk;touch;unzip;touch; strip;gasp;finger;gasp;mount; fsck; more; yes; gasp; umount; make clean; sleep;wakeup;goto http://www.md5this.com |
|
|
|
Posted: Sun Apr 03, 2011 2:56 am |
|
|
jmmille |
Regular user |

 |
|
Joined: Mar 30, 2011 |
Posts: 8 |
|
|
|
 |
 |
 |
|
I have a EVGA Nvidia GTX260. I'm getting about 200M/s with this card. I'm not having any luck at using the CPU's to work at cracking the md5 simultaneously. |
|
|
|
|
Posted: Sun Apr 03, 2011 9:08 am |
|
|
ToXiC |
Moderator |

 |
|
Joined: Dec 01, 2004 |
Posts: 181 |
Location: Cyprus |
|
|
 |
 |
 |
|
jmmille wrote: | I have a EVGA Nvidia GTX260. I'm getting about 200M/s with this card. I'm not having any luck at using the CPU's to work at cracking the md5 simultaneously. |
gtx260 good.
Do you use wordlists ? or normal attacks ?
D3ad0ne wrote a nice article on how do you use oclhashcat.
http://ob-security.info/?p=116 |
|
_________________ who|grep -i blonde|talk; cd~;wine;talk;touch;unzip;touch; strip;gasp;finger;gasp;mount; fsck; more; yes; gasp; umount; make clean; sleep;wakeup;goto http://www.md5this.com |
|
|
|
Posted: Mon Apr 04, 2011 8:23 pm |
|
|
jmmille |
Regular user |

 |
|
Joined: Mar 30, 2011 |
Posts: 8 |
|
|
|
 |
 |
 |
|
Thanks for the link. It was very informative.
I'm not sure oclhashcat+ will woth for vBulletin. I don't see md5(md5(password).salt) in the list of supported hashes. Do you know if it's supported and just not listed?
Thanks |
|
|
|
|
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|