 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 305
Members: 0
Total: 305
|
|
|
|
|
 |
Full disclosure |
 |
Google Firebase hosting suspension / "malware distribution"bypass
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
MD5 has needs to be cracked |
 |
Posted: Tue Dec 25, 2007 8:22 pm |
|
|
nah |
Beginner |

 |
|
Joined: Dec 25, 2007 |
Posts: 2 |
|
|
|
 |
 |
 |
|
d14f265843a8dbb017d0e32c50deb9c2
thank you in advance! |
|
|
|
|
Posted: Fri Dec 28, 2007 7:17 pm |
|
|
nah |
Beginner |

 |
|
Joined: Dec 25, 2007 |
Posts: 2 |
|
|
|
 |
 |
 |
|
so nobody can crack it  |
|
|
|
|
Posted: Sat Dec 29, 2007 7:15 pm |
|
|
pooterman |
Beginner |

 |
|
Joined: Dec 29, 2007 |
Posts: 1 |
|
|
|
 |
 |
 |
|
I think MD5 is uncrackable
i have been trying to get
291c8736f7abe42083d4fd1a58557a86
c51fd500d6fcc2b2819337b693e21f2e
and
f05512e61923ffa1ab81ce02f1efd284
for ages now on many forums an nobody can do it |
|
|
|
|
Posted: Sat Dec 29, 2007 7:53 pm |
|
|
waraxe |
Site admin |

 |
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
 |
 |
 |
|
MD5 hash is uncrackable, if original plaintext password is very strong.
If it's too short, then bruteforce or rainbow method will crack it and if it's constructed from known words, then dictionary method can be successful.
But if it's really good password, then it's virtually uncrackable. |
|
|
|
|
 |
Please.. |
 |
Posted: Sat Jan 05, 2008 11:25 am |
|
|
Th3_Crack3r |
Regular user |

 |
|
Joined: Dec 30, 2007 |
Posts: 5 |
|
|
|
 |
 |
 |
|
0760c5f5b75ae4039b122341fbc3ea8d
276ed98651ba659dc0236c55045907fc
313bf48b7209c50d0454d3f454f4de01
can it decode ??? Please... |
|
|
|
|
www.waraxe.us Forum Index -> MD5 hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|