 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 200
Members: 0
Total: 200
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
Two Md5 hashes, please! |
 |
Posted: Mon May 09, 2011 3:42 am |
|
|
3vangel |
Regular user |

 |
|
Joined: May 09, 2011 |
Posts: 7 |
|
|
|
 |
 |
 |
|
Pay may be negotiable.
ec27cc513e7d96d210a440b988b791b5
3e0157a1804ef9fe7e75bb82e39e4ae7
it is possible that these could be fake hashes, due to the fact I don't really know much about them doesn't seem to help lol.
I've tried bruteforcing, a dict attack, and mixalpha-numeric rainbow tables up to 6 characters but both to no avail.
if you could please take a moment to try these 2 for me that would be great, thank you!! |
|
Last edited by 3vangel on Wed May 11, 2011 4:31 pm; edited 2 times in total |
|
|
|
Posted: Tue May 10, 2011 4:08 pm |
|
|
3vangel |
Regular user |

 |
|
Joined: May 09, 2011 |
Posts: 7 |
|
|
|
 |
 |
 |
|
I know every ones probably busy or these are to hard to crack, but I really need help... Thanks again
p.s. if its anything I could possibly pay. |
|
|
|
|
Posted: Tue May 10, 2011 11:47 pm |
|
|
3vangel |
Regular user |

 |
|
Joined: May 09, 2011 |
Posts: 7 |
|
|
|
 |
 |
 |
|
And is it normal for hashes to change? One of the hashes up there apparently became
2f179a7beee8f4129c8aaaf4861a969f
today, I'm wondering if it could be the same pass? or what...
So lost!, please help... |
|
|
|
|
Posted: Wed May 11, 2011 7:44 am |
|
|
Mullog |
Advanced user |

 |
|
Joined: Aug 29, 2010 |
Posts: 540 |
|
|
|
 |
 |
 |
|
hm they are valid hashes but when they change it is nearly impossible to crack because I think he knows what he do. So the pw will be very komplex and befor you can even crack it it changes.
and no it is not the same pass it is only possible when its salted and its not salted as it seems. |
|
|
|
|
Posted: Wed May 11, 2011 2:59 pm |
|
|
3vangel |
Regular user |

 |
|
Joined: May 09, 2011 |
Posts: 7 |
|
|
|
 |
 |
 |
|
Hmm... well apparently my hash that recently changed is now back to the first hash again... so yet again lost and confused lol... have you tried cracking those ones? or are they just to much?
ec27cc513e7d96d210a440b988b791b5
3e0157a1804ef9fe7e75bb82e39e4ae7
are the only 2 I need, and even if one of them can be cracked I can find out if its legit or not. |
|
_________________ Optimistic:. |
|
|
|
Posted: Wed May 11, 2011 6:24 pm |
|
|
Mullog |
Advanced user |

 |
|
Joined: Aug 29, 2010 |
Posts: 540 |
|
|
|
 |
 |
 |
|
when its from a site who claim that they can crack yahoo/facebook etc acc its fake
and I hope you dont pay money for that hashes |
|
|
|
|
Posted: Wed May 11, 2011 6:26 pm |
|
|
3vangel |
Regular user |

 |
|
Joined: May 09, 2011 |
Posts: 7 |
|
|
|
 |
 |
 |
|
Not at all lol, thats why I was waiting on someone here to help me clarify that before I put myself into a situation as such =P thanks for the update tho. |
|
_________________ Optimistic:. |
|
|
|
www.waraxe.us Forum Index -> MD5 hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|