 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 282
Members: 0
Total: 282
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
Question regarding md5 and salt.. (hope this is right place) |
 |
Posted: Thu Feb 14, 2008 1:22 am |
|
|
bluejay44 |
Beginner |

 |
|
Joined: Feb 12, 2008 |
Posts: 2 |
|
|
|
 |
 |
 |
|
Feel free to flame if this isnt the right place
Im a noob at this sort of thing, but ive gotten curious. I decided to try to crack one of my own passwords to see if i can do it. Well, after a few mins i thought i had my md5... much to my surprise, the md5 wasn't being decoded from any of the online applications i tried, and i simply could not produce a proper password from cain or passwordspro. Then I learned about salt... ><
is there any way to get around this salt? remove it from the equation, or wtvr is necessary, so I can properly decode this md5? If it is possible, i'd rather learn how to do it myself than have someone do it, so i wont post the md5 unless I have to. Thanks!  |
|
|
|
|
 |
Re: Question regarding md5 and salt.. (hope this is right pl |
 |
Posted: Tue Apr 08, 2008 11:45 am |
|
|
ToXiC |
Moderator |

 |
|
Joined: Dec 01, 2004 |
Posts: 181 |
Location: Cyprus |
|
|
 |
 |
 |
|
bluejay44 wrote: | Feel free to flame if this isnt the right place
Im a noob at this sort of thing, but ive gotten curious. I decided to try to crack one of my own passwords to see if i can do it. Well, after a few mins i thought i had my md5... much to my surprise, the md5 wasn't being decoded from any of the online applications i tried, and i simply could not produce a proper password from cain or passwordspro. Then I learned about salt... ><
is there any way to get around this salt? remove it from the equation, or wtvr is necessary, so I can properly decode this md5? If it is possible, i'd rather learn how to do it myself than have someone do it, so i wont post the md5 unless I have to. Thanks!  |
salting is an extra feuture added to the actual method of hashing a password.
The result though of that method is a different MD5 value.. but more difficult to crack.
md5 output is a fix 32 character [A-f] [0_9] value
salted md5 has the same output.
but the method of hashing it :
if you need a method like this to make a simple hash
md5($value)
the salted is
md5(md5($value+$salt)
where $salt is a NON FIXED random value
as i mentioned above at both cases the result is a fixed value so you cannot distinguish whether a value is salted or not.
The best thing to do is to make a research on the php application how it stores the value to the database or when you post in the forum to crack a value for the people who are willing to help you you have to tell the php application that hash came from and the salted value.
Most of the times salted value is located at the same table that the password is.So with a small modification of the query you can come up with the salted value. |
|
_________________ who|grep -i blonde|talk; cd~;wine;talk;touch;unzip;touch; strip;gasp;finger;gasp;mount; fsck; more; yes; gasp; umount; make clean; sleep;wakeup;goto http://www.md5this.com |
|
|
|
 |
www.waraxe.us Forum Index -> Hash related information
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|